Stored Cross-Site Scripting in Pagelayer WordPress Plugin
CVE-2023-6738
5.4MEDIUM
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 4 January 2024
Summary
The Pagelayer WordPress plugin is susceptible to Stored Cross-Site Scripting vulnerabilities due to inadequate input sanitization and output escaping in the 'pagelayer_header_code', 'pagelayer_body_open_code', and 'pagelayer_footer_code' meta fields. Authenticated attackers with contributor-level permissions can exploit this flaw to inject malicious scripts that execute whenever a user accesses the compromised page. This issue seems to have resurfaced following a fix in version 1.7.7.
Affected Version(s)
Page Builder: Pagelayer – Drag and Drop website builder * <= 1.7.8
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Nex Team