Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | N/A |
CWE-ID | CWE-254 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
WPS Hide Login Web applications / Modules and components for CMS |
Vendor | Rémy Perona |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU24678
Risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: N/A
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to find and access the secret login page.
The vulnerability exists in the "plugins_loaded" function due to some REQUEST_URI occurrences aren’t decoded using the "rawurldecode" function. A remote attack can encode substrings in the URL in order to evade the detection and gain access to the hidden login page.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWPS Hide Login: 1.1 - 1.5.4.2
CPE2.3http://wpvulndb.com/vulnerabilities/10046/
http://blog.nintechnet.com/wordpress-wps-hide-login-fixed-security-issue/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.