Cross-Site Scripting in miniOrange SAML 2.0 Single Sign-On Plugin for WordPress
CVE-2020-6850

6.1MEDIUM

Key Information:

Vendor

Wordpress

Vendor
CVE Published:
17 February 2020

What is CVE-2020-6850?

The miniOrange SAML 2.0 Single Sign-On plugin for WordPress is prone to a security vulnerability that permits Cross-Site Scripting (XSS) attacks. Specifically, this issue arises from the handling of user-supplied parameters, including SAMLResponse and RelayState, and can be exploited via a crafted SAML XML Response directed at the login page. Successful exploitation may result in unauthorized access or malicious script execution in the context of the victim's browser, undermining the integrity of the website and user's session.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.