Security for everyone

CVE-2023-0099 Scanner

Detects 'Cross Site Scripting' vulnerability in Simple URLs WordPress plugin affects versions before 115


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2023-0099 Scanner Detail

Simple URLs is a WordPress plugin developed by GetLasso, designed to manage URL redirections and tracking for links within WordPress websites. It allows site administrators to create, manage, and track outbound links from their site, providing a cleaner way to manage affiliate links and other external links. The plugin is popular among WordPress users for its simplicity and effectiveness in organizing links and monitoring click-through rates. It is particularly useful for marketers, bloggers, and website owners looking to optimize their external link management. However, like any software, it is subject to potential security vulnerabilities that need to be addressed to prevent exploitation.

The Cross Site Scripting (XSS) vulnerability in the Simple URLs plugin before version 115 arises from the lack of proper sanitization and escaping of some parameters before they are outputted back in certain pages. This oversight allows attackers to inject malicious scripts into web pages viewed by other users. Reflected XSS attacks are particularly dangerous as they can be used to execute scripts in the context of a high-privilege user's session, potentially leading to unauthorized actions such as session hijacking and sensitive data theft.

Specifically, the vulnerability is present in the admin assets of the Simple URLs plugin, where the 'search' parameter is not properly sanitized in the import-js.php file. An attacker can craft a malicious URL containing a script tag or other JavaScript code snippet. When this URL is visited by a user with sufficient privileges, such as an administrator, the malicious code is executed in their browser. This can lead to various security breaches, including the stealing of session cookies, personal data, or even manipulation of website content.

If exploited, the XSS vulnerability in Simple URLs can have severe consequences, including session hijacking, where an attacker takes control of a user's session to gain unauthorized access to the WordPress dashboard. It can also lead to the defacement of websites, where attackers alter the appearance or content of the site without permission. Additionally, sensitive information belonging to the website or its users could be stolen and used for malicious purposes, and in some cases, it may enable attackers to perform remote code execution on the affected site.

By leveraging the security scanning services offered by securityforeveryone, users can identify vulnerabilities such as the XSS issue in the Simple URLs plugin before they are exploited. Our platform provides detailed vulnerability assessments, including identification, impact analysis, and remediation recommendations. By becoming a member, you'll gain access to continuous monitoring and expert guidance, helping to protect your website against current and emerging threats. Joining securityforeveryone ensures that your website remains secure, maintaining the trust of your users and safeguarding your online presence.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture