Home

Description

Powie's WHOIS Domain Check 0.9.31 contains a persistent cross-site scripting vulnerability that allows authenticated attackers to inject arbitrary JavaScript by exploiting unsanitized input fields in plugin settings. Attackers can submit malicious payloads through textarea and input elements in the pwhois_settings.php configuration page to execute JavaScript in the admin context and escalate privileges.

PUBLISHED Reserved 2026-05-13 | Published 2026-05-13 | Updated 2026-05-13 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

0.9.31
affected

Credits

mqt finder

References

www.exploit-db.com/exploits/48656 (ExploitDB-48656) exploit

powie.de (Official Product Homepage) product

blog.haao.sh (Official Product Homepage) product

wordpress.org/plugins/powies-whois/ (Product Reference) product

www.vulncheck.com/...n-check-persistent-cross-site-scripting (VulnCheck Advisory: Powie's WHOIS Domain Check 0.9.31 Persistent Cross-Site Scripting) third-party-advisory

cve.org (CVE-2020-37225)

nvd.nist.gov (CVE-2020-37225)

Download JSON