First published: Mon Jun 24 2019(Updated: )
In the miniOrange SAML SP Single Sign On plugin before 4.8.73 for WordPress, the SAML Login Endpoint is vulnerable to XSS via a specially crafted SAMLResponse XML post.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
miniOrange SAML SP Single Sign On | <4.8.73 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12346 is a vulnerability in the miniOrange SAML SP Single Sign On plugin for WordPress that allows for XSS attacks via a specially crafted SAMLResponse XML post.
CVE-2019-12346 allows attackers to execute malicious code through XSS attacks on WordPress websites that have the vulnerable miniOrange SAML SP Single Sign On plugin.
CVE-2019-12346 has a severity rating of 6.1 (Medium).
To fix CVE-2019-12346, users should update the miniOrange SAML SP Single Sign On plugin to version 4.8.73 or higher.
More information about CVE-2019-12346 can be found at the following references: [Reference 1](https://wpvulndb.com/vulnerabilities/9397) and [Reference 2](https://zeroauth.ltd/blog/2019/05/27/cve-2019-12346-miniorange-saml-sp-single-sign-on-wordpress-plugin-xss/).