Lucene search

K
vulnrichmentWPScanVULNRICHMENT:CVE-2023-5971
HistoryMay 09, 2024 - 6:00 a.m.

CVE-2023-5971 Save as PDF < 3.2.0 - Admin+ Stored XSS

2024-05-0906:00:02
WPScan
github.com
2
pdf
plugin
xss
wordpress

AI Score

5.6

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

The Save as PDF Plugin by Pdfcrowd WordPress plugin before 3.2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:pdfcrowd:save_as_pdf:*:*:*:*:*:wordpress:*:*"
    ],
    "vendor": "pdfcrowd",
    "product": "save_as_pdf",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "3.2.0",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

AI Score

5.6

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-5971