支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:736

73.6%
一、 漏洞 CVE-2025-14375 基础信息
漏洞信息
                                        # RSS聚合器 5.0.10 反射型XSS漏洞

## 概述
RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging 插件在所有版本至 5.0.10(含)中,由于对输入参数缺乏足够的过滤和输出转义,存在反射型跨站脚本(XSS)漏洞。

## 影响版本
5.0.10 及之前的所有版本

## 细节
漏洞存在于插件对 'className' 参数的处理过程中,攻击者可利用该参数注入恶意脚本。该漏洞为反射型 XSS,需诱使用户点击恶意链接才能触发。

## 影响
未经身份验证的攻击者可构造恶意链接,诱使用户点击,从而在用户浏览器中执行任意脚本,可能导致会话劫持或敏感信息泄露。
                                        
神龙判断

是否为 Web 类漏洞: 未知

判断理由:

N/A
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging <= 5.0.10 - Reflected Cross-Site Scripting via className
来源:美国国家漏洞数据库 NVD
漏洞描述信息
The RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘className’ parameter in all versions up to, and including, 5.0.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
来源:美国国家漏洞数据库 NVD
漏洞类别
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
来源:美国国家漏洞数据库 NVD
二、漏洞 CVE-2025-14375 的公开POC
#POC 描述源链接神龙链接
三、漏洞 CVE-2025-14375 的情报信息
  • 标题: Changeset 3439384 for wp-rss-aggregator – WordPress Plugin Repository -- 🔗来源链接

    标签:

    神龙速读:
                                            **Vulnerability Information:**
    
    - **Plugin:** wp-rss-aggregator
    - **Changeset:** 439384
    - **Date:** 2023-01-14 10:17:26 AM
    - **Version:** v5.0.11
    - **Developer:** Nimidakavan
    
    **Key Changes (Potential Vulnerability Areas):**
    
    1. **Nonce Verification Implementation:**
       - Nonce verification added in `renderer.php`. This could address potential CSRF vulnerabilities.
    
    2. **HTML Output Modifications:**
       - Changes in `LayoutTrait.php` and `listlayout.php` for HTML output handling. Ensure proper HTML escaping to prevent XSS vulnerabilities.
    
    3. **Image Download Functionality:**
       - Modifications in `lrImage.php`. Important to review for potential file handling and validation issues.
    
    4. **Renderer Arguments Validation:**
       - Changes in `Renderer.php` and `v4SourceMigrator.php`. Ensure validated user input processing to prevent injection vulnerabilities.
    
    **Potential Vulnerabilities to Review:**
    
    - Ensure proper sanitization and validation are applied in all user-input processing.
    - Validate and secure image handling functions in `lrImage.php`.
    - Review HTML output functions in `Display` to mitigate XSS risks.
    - Confirm nonce usage and session security improvements address CSRF threats.
    
    **Security Recommendations:**
    
    - Validate all form submissions with nonce checks.
    - Sanitize all user inputs and outputs.
    - Regularly update dependencies and test for vulnerabilities.
                                            
    Changeset 3439384 for wp-rss-aggregator – WordPress Plugin Repository
  • 标题: ERROR: The request could not be satisfied -- 🔗来源链接

    标签:

    神龙速读:
                                            ## 403 Error Key Information
    
    - **Error Code:** 403 ERROR
    - **Status Message:** The request could not be satisfied.
    - **Error Description:** Request blocked. We can't connect to the server for this app or website at this time.
    - **Possible Causes:**
        - Too much traffic
        - Configuration error
    - **Suggested Actions:**
        - Try again later
        - Contact the app or website owner
        - Review the CloudFront documentation for troubleshooting and preventing this error
    - **Generated By:** cloudfront (CloudFront)
    - **Request ID:** AsgXyBNBcivp202jhv-4wxV_Hi3U6oNgyqg0AJ2J5HWiPRbM0LnxVg==
                                            
    ERROR: The request could not be satisfied
  • https://nvd.nist.gov/vuln/detail/CVE-2025-14375
四、漏洞 CVE-2025-14375 的评论

暂无评论


发表评论