Cross-Site Scripting in miniOrange SAML 2.0 Single Sign-On Plugin for WordPress
CVE-2020-6850

6.1MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
17 February 2020

Summary

The miniOrange SAML 2.0 Single Sign-On plugin for WordPress is prone to a security vulnerability that permits Cross-Site Scripting (XSS) attacks. Specifically, this issue arises from the handling of user-supplied parameters, including SAMLResponse and RelayState, and can be exploited via a crafted SAML XML Response directed at the login page. Successful exploitation may result in unauthorized access or malicious script execution in the context of the victim's browser, undermining the integrity of the website and user's session.

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.