Lucene search

K
nvd[email protected]NVD:CVE-2023-5291
HistoryOct 04, 2023 - 2:15 a.m.

CVE-2023-5291

2023-10-0402:15:10
web.nvd.nist.gov
4
wordpress
blog filter plugin
cve-2023-5291
input sanitization
output escaping
cross-site scripting
authenticated attackers

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

23.8%

The Blog Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via ‘AWL-BlogFilter’ shortcode in versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Affected configurations

Nvd
Node
awplifeblog_filterRange1.5.3wordpress
VendorProductVersionCPE
awplifeblog_filter*cpe:2.3:a:awplife:blog_filter:*:*:*:*:*:wordpress:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

23.8%

Related for NVD:CVE-2023-5291