diff --git a/nuclei-templates/cve-less/plugins/wp-spid-italia-3646bc234db5365fe429e884ef9b3842.yaml b/nuclei-templates/cve-less/plugins/wp-spid-italia-3646bc234db5365fe429e884ef9b3842.yaml new file mode 100644 index 0000000000..9729cf4591 --- /dev/null +++ b/nuclei-templates/cve-less/plugins/wp-spid-italia-3646bc234db5365fe429e884ef9b3842.yaml @@ -0,0 +1,59 @@ +id: wp-spid-italia-3646bc234db5365fe429e884ef9b3842 + +info: + name: > + WP SPID Italia <= 2.9 - Authenticated (Contributor+) Stored Cross-Site Scripting + author: topscoder + severity: low + description: > + + reference: + - https://github.com/topscoder/nuclei-wordfence-cve + - https://www.wordfence.com/threat-intel/vulnerabilities/id/0cdadbf2-8b5d-4018-8cee-0d0fb07696f9?source=api-scan + classification: + cvss-metrics: + cvss-score: + cve-id: + metadata: + fofa-query: "wp-content/plugins/wp-spid-italia/" + google-query: inurl:"/wp-content/plugins/wp-spid-italia/" + shodan-query: 'vuln:' + tags: cve,wordpress,wp-plugin,wp-spid-italia,low + +http: + - method: GET + redirects: true + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/plugins/wp-spid-italia/readme.txt" + + extractors: + - type: regex + name: version + part: body + group: 1 + internal: true + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + - type: regex + name: version + part: body + group: 1 + regex: + - "(?mi)Stable tag: ([0-9.]+)" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "wp-spid-italia" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 2.9') \ No newline at end of file