CVE-2023-3388
🟡 Monitoruj
Wtyczka Beautiful Cookie Consent Banner dla WordPressa jest podatna na XSS, co pozwala na wstrzyknięcie skryptów.
CVSS
7.2
EPSS
59.1%
Exploit
none
Vendor
beautiful-cookie-banner
Opis źródłowy (NVD)
The Beautiful Cookie Consent Banner for WordPress is vulnerable to Stored Cross-Site Scripting via the 'nsc_bar_content_href' parameter in versions up to, and including, 2.10.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. A partial patch was made available in 2.10.1 and the issue was fully patched in 2.10.2.
xss
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.2 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 59.1% |
| Opublikowano (NVD) | 2023-06-24 03:15:09 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 18:18:09 UTC |
Referencje
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2857982%40beautiful-and-responsive-cookie-consent&new=2857982%40beautiful-and-responsive-cookie-consent&sfp_email=&sfph_mail= (security@wordfence.com) [Patch]
- https://www.wordfence.com/blog/2023/05/wordfence-firewall-blocks-bizarre-large-scale-xss-campaign/ (security@wordfence.com) [Third Party Advisory]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/542a4079-b1a2-49bc-9ddd-ba7978c9992e?source=cve (security@wordfence.com) [Third Party Advisory]