Advisory

WordPress Login-with-Ajax Plugin "Callback" Cross-Site Scripting (XSS)

Dell SecureWorks Security Advisory SWRX-2012-003

Advisory Information

  • Title: WordPress login-with-ajax plugin "callback" cross-site scripting (XSS)
  • Advisory ID: SWRX-2012-003
  • Date published: Friday, May 18, 2012
  • CVE: CVE-2012-2759
  • CVSS v2 base score: 4.3
  • Date of last update: Friday, May 18, 2012
  • Vendors contacted: WordPress
  • Release mode: Coordinated
  • Discovered by: Stewart McIntyre, Dell SecureWorks

Summary

Login With Ajax is a plugin for WordPress that provides an alternate site login using AJAX. A vulnerability exists in Login With Ajax versions prior to 3.0.4.1 due to insufficient input validation affecting JSON callbacks. Successful exploitation may aid an attacker in retrieving session cookies, stealing recently submitted data, or launching further attacks.

Download the PDF

PGP Signature (PC Users: You may need to right click your mouse and select "Save As" or "Save Target As" and then open with Notepad)

SecureWorks CTU Public Key



ABOUT THE AUTHOR
COUNTER THREAT UNIT RESEARCH TEAM

The Secureworks Counter Threat Unit™ (CTU) is a dedicated threat research team that analyzes threat data across our global customer base and actively monitors the threat landscape.
Back to more Threat Analyses and Advisories

GET THE LATEST SECURITY UPDATES

Thank you for your submission.

Talk with an Expert

Thank you for submitting the form! We have received your request. A Secureworks team member will contact you within one business day.