Vulnerability Description: - The plugin does not sanitize and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting vulnerability, which can be exploited against users with high privileges like administrators. Proof of Concept: - The given URL in the screenshot is a sample showing how the malicious script can be injected. Affected Plugins: - wp-login-control (No known fix currently available). References: - CVE reference: CVE-2024-13836. Classification: - Type: XSS - OWASP Top 10: A7: Cross-Site Scripting (XSS) - CWE: CWE-79 - CVSS: 7.1 (high). Miscellaneous: - Original Researcher: Hassan Khan Yusufzai - Splint3r7 - Submitter: Hassan Khan Yusufzai - Splint3r7 - Submitter Website: https://hassankhanyusufzai.com - Submitter Twitter: Splint3r7 - Verified: Yes - WPVDB ID: 26c2026a-1490-4a0f-9d1d-54ee43c69f22 Timeline: - Publicly Published: 2025-02-18 (about 8 months ago) - Added: 2025-02-18 (about 8 months ago) - Last Updated: 2025-02-18 (about 8 months ago) Other Vulnerabilities ( titles and publication dates ): - Picture Gallery < 1.5.12 - Authenticated (Author+) Stored Cross-Site Scripting (Published: 2024-05-14) - WP Edit <= 4.0.4 - Authenticated (Administrator+) Stored Cross-Site Scripting (Published: 2025-06-27) - Easy Table of Contents < 2.0.66 - Admin+ Stored XSS (Published: 2024-06-05) - Variable Inspector < 2.6.3 - Reflected Cross-Site Scripting (Published: 2025-02-23) - Form to Chat App < 1.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting (Published: 2024-04-05)