Stored Cross-Site Scripting in Poptin Plugin for WordPress
CVE-2023-4961
5.4MEDIUM
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 20 October 2023
Summary
The Poptin plugin for WordPress, prior to version 1.3, contains a Stored Cross-Site Scripting vulnerability due to inadequate input sanitization and output escaping of user-supplied attributes in the 'poptin-form' shortcode. This flaw allows authenticated attackers with contributor-level or higher permissions to inject arbitrary web scripts into pages. These scripts could execute whenever an unsuspecting user accesses a page containing the modified form, potentially compromising user data and site integrity.
Affected Version(s)
Pop ups, WordPress Exit Intent Popup, Email Pop Up, Lightbox Pop Up, Spin the Wheel, Contact Form Builder – Poptin * <= 1.3
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Lana Codes