Cross-Site Scripting in miniOrange SAML 2.0 Single Sign-On Plugin for WordPress
CVE-2020-6850

6.1MEDIUM

Key Information:

Vendor

Wordpress

Vendor
CVE Published:
17 February 2020

What is CVE-2020-6850?

The miniOrange SAML 2.0 Single Sign-On plugin for WordPress is prone to a security vulnerability that permits Cross-Site Scripting (XSS) attacks. Specifically, this issue arises from the handling of user-supplied parameters, including SAMLResponse and RelayState, and can be exploited via a crafted SAML XML Response directed at the login page. Successful exploitation may result in unauthorized access or malicious script execution in the context of the victim's browser, undermining the integrity of the website and user's session.

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.