WordPress.Limit.Login.Attempts.Plugin.Stored.XSS
Description
This indicates an attack attempt to exploit a Cross-Site Scripting Vulnerability in WordPress Project Limit Login Attempts Plugin.
The vulnerability is due to improper input validation. A remote, unauthenticated attacker could exploit this vulnerability by sending crafted requests to the target system. Successful exploitation could result in stored cross-site scripting.
Affected Products
WordPress Project Limit Login Attempts Plugin prior to 1.7.2
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.limitloginattempts.com/?gclid=Cj0KCQjwmtGjBhDhARIsAEqfDEcUe607pYIHyGeg2-69i49ZqcFqXFb6kYW0Bjec23DPNEcylN4NUmQaAt0-EALw_wcB
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |