Cross-Site Scripting in miniOrange SAML 2.0 Single Sign-On Plugin for WordPress
CVE-2020-6850
6.1MEDIUM
Summary
The miniOrange SAML 2.0 Single Sign-On plugin for WordPress is prone to a security vulnerability that permits Cross-Site Scripting (XSS) attacks. Specifically, this issue arises from the handling of user-supplied parameters, including SAMLResponse and RelayState, and can be exploited via a crafted SAML XML Response directed at the login page. Successful exploitation may result in unauthorized access or malicious script execution in the context of the victim's browser, undermining the integrity of the website and user's session.
References
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved