# WP Allowed Hosts 存储型XSS漏洞
## 概述
WP Allowed Hosts WordPress插件在1.0.8及之前版本中存在存储型跨站脚本漏洞,源于对`allowed-hosts`参数缺少充分的输入过滤与输出转义。
## 影响版本
1.0.8及以下版本
## 细节
该漏洞存在于WP Allowed Hosts插件的`allowed-hosts`参数处理过程中。由于未对用户输入进行严格的输入验证和输出转义,经过身份验证的攻击者(需管理员及以上权限)可向系统注入恶意脚本。
漏洞触发仅限于以下两种情况:
- 多站点(multi-site)安装环境
- 系统中`unfiltered_html`权限被禁用的环境
## 影响
攻击者可将恶意脚本存储在受影响页面中,当其他用户访问这些页面时,脚本将被执行,可能导致会话劫持、权限提升或敏感信息泄露等后果。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: WP Allowed Hosts <= 1.0.8 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'allowed-hosts' Parameter -- 🔗来源链接
标签:
神龙速读:
- **CVE**: CVE-2026-0734
- **CVSS**: 4.4 (Medium)
- **Publicly Published**: January 13, 2026
- **Last Updated**: January 14, 2026
- **Researcher**: 0x34rth
- **Vulnerability Type**: Improper Neutralization of Input During Web Page Generation (Cross-site Scripting)
- **Description**: The WP Allowed Hosts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'allowed-hosts' parameter in all versions up to, and including, 1.0.8 due to insufficient input sanitization and output escaping.
- **Affected Plugin**: WP Allowed Hosts
- **Software Slug**: wp-allow-hosts
- **Patched?**: No
- **Remediation**: No known patch available. Review vulnerability details and employ mitigations based on organization's risk tolerance. Consider uninstalling the affected software.
- **Affected Version**: <= 1.0.8
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.