
Cloud Vulnerability DB
A community-led vulnerabilities database
The Auth0 wp-auth0 plugin versions 3.11.0 through 3.11.2 for WordPress contains a cross-site scripting (XSS) vulnerability that was discovered and disclosed in January 2020. The vulnerability affects the plugin's login functionality, specifically related to the wle parameter associated with wp-login.php (Auth0 Bulletin).
The vulnerability stems from improper sanitization of the wle query parameter in the WordPress login page. This security flaw is present when the "Original Login Form on wp-login.php" setting under Basic settings is configured to either "Via a link under the Auth0 form" (default option) or "When 'wle' query parameter is present" (Auth0 Bulletin).
If successfully exploited, this vulnerability could allow an attacker to execute cross-site scripting (XSS) attacks on the login page, potentially compromising user security and website integrity (Auth0 Bulletin).
The vulnerability was patched in version 3.11.3 of the WordPress Plugin for Auth0. Users are advised to upgrade to version 3.11.3 or later to remediate this security issue. The update does not impact users, their current state, or any existing sessions (Auth0 Bulletin, GitHub Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."