.. / CVE-2023-2009

Exploit for Pretty Url <= 1.5.4 - Cross-Site Scripting (CVE-2023-2009)

Description:

Plugin does not sanitize and escape the URL field in the plugin settings, which could allow high-privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

Nuclei Template

View the template here CVE-2023-2009.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-2009.yaml
Copy

References:

https://wpscan.com/vulnerability/f7988a18-ba9d-4ead-82c8-30ea8223846f
https://nvd.nist.gov/vuln/detail/CVE-2023-2009
https://wordpress.org/plugins/pretty-url/