Lucene search

K
cve[email protected]CVE-2023-1912
HistoryApr 06, 2023 - 3:15 p.m.

CVE-2023-1912

2023-04-0615:15:08
web.nvd.nist.gov
32
cve-2023-1912
wordpress
vulnerability
stored xss
input sanitization
output escaping
unauthenticated attackers
administrator access

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

5.8 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.2%

The Limit Login Attempts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its lock logging feature in versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator accesses the plugin’s settings page. This only works when the plugin prioritizes use of the X-FORWARDED-FOR header, which can be configured in its settings.

Affected configurations

Vulners
NVD
Node
automatticjetpackRange1.7.1
VendorProductVersionCPE
automatticjetpack*cpe:2.3:a:automattic:jetpack:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "automattic",
    "product": "Limit Login Attempts",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.7.1",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

5.8 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.2%