Lucene search

K
cveWPScanCVE-2023-6082
HistoryFeb 12, 2024 - 4:15 p.m.

CVE-2023-6082

2024-02-1216:15:08
WPScan
web.nvd.nist.gov
69
cve-2023-6082
wordpress
plugin
stored xss
nvd
security vulnerability

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

7.6

Confidence

High

EPSS

0

Percentile

9.0%

The chartjs WordPress plugin through 2023.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

Affected configurations

Vulners
Vulnrichment
Node
chartjsRange2023.2wordpress
VendorProductVersionCPE
*chartjs*cpe:2.3:a:*:chartjs:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "chartjs",
    "versions": [
      {
        "status": "affected",
        "versionType": "semver",
        "version": "2023.2",
        "lessThanOrEqual": "2023.2"
      }
    ],
    "defaultStatus": "affected"
  }
]

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

7.6

Confidence

High

EPSS

0

Percentile

9.0%