CVE-2023-4719
🟡 Monitoruj
Wtyczka Simple Membership dla WordPressa ma lukę XSS, umożliwiającą atakującym wstrzykiwanie skryptów.
CVSS
7.2
EPSS
1.4%
Exploit
none
Vendor
simple-membership-plugin
Opis źródłowy (NVD)
The Simple Membership plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `list_type` parameter in versions up to, and including, 4.3.5 due to insufficient input sanitization and output escaping. Using this vulnerability, unauthenticated attackers could inject arbitrary web scripts into pages that are being executed if they can successfully trick a user into taking an action, such as clicking a malicious link.
xss
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.2 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 1.4% |
| Opublikowano (NVD) | 2023-09-06 02:15:09 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 19:18:34 UTC |
Referencje
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2962730%40simple-membership&new=2962730%40simple-membership&sfp_email=&sfph_mail= (security@wordfence.com) [Patch]
- https://wordpress.org/plugins/simple-membership/ (security@wordfence.com) [Product]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e4b10172-7e54-4ff8-9fbb-41d160ce49e4?source=cve (security@wordfence.com) [Third Party Advisory]