WordPress Sendle Shipping Plugin <= 5.13 is vulnerable to Cross Site Scripting (XSS)
CVE-2023-45761

7.1HIGH

Key Information:

Vendor

WordPress

Vendor
CVE Published:
25 October 2023

What is CVE-2023-45761?

The Joovii Sendle Shipping Plugin for WordPress versions up to 5.13 is affected by an unauthenticated reflected Cross-Site Scripting (XSS) vulnerability. This flaw allows attackers to inject malicious scripts through crafted user input, potentially leading to the execution of unauthorized actions on behalf of users interacting with affected pages. Users and administrators of the plugin should take necessary precautions to mitigate the risk, such as upgrading to the latest version or implementing security measures to filter input.

Affected Version(s)

Sendle Shipping Plugin <= 5.13

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

LEE SE HYOUNG (Patchstack Alliance)
.