.. / CVE-2023-34020

Exploit for Uncanny Toolkit for LearnDash - Open Redirection (CVE-2023-34020)

Description:

A vulnerability in the WordPress Uncanny Toolkit for LearnDash Plugin allowed malicious actors to redirect users, posing a potential risk of phishing incidents. The issue has been resolved in version 3.6.4.4, and users are urged to update for security.

Nuclei Template

View the template here CVE-2023-34020.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-34020.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2023-34020
https://patchstack.com/database/vulnerability/uncanny-learndash-toolkit/wordpress-uncanny-toolkit-for-learndash-plugin-3-6-4-3-open-redirection-vulnerability
https://patchstack.com/database/vulnerability/uncanny-learndash-toolkit/wordpress-uncanny-toolkit-for-learndash-plugin-3-6-4-3-open-redirection-vulnerability?_s_id=cve
https://wordpress.org/plugins/uncanny-learndash-toolkit/