Unfiltered HTML Settings Vulnerability in Pagelayer WordPress Plugin
CVE-2023-7115
Currently unrated
Key Information:
- Vendor
- Wordpress
- Status
- Vendor
- CVE Published:
- 27 February 2024
Badges
πΎ Exploit Existsπ‘ Public PoC
Summary
The Page Builder: Pagelayer WordPress plugin before 1.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Affected Version(s)
Page Builder: Pagelayer 0 < 1.8.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
websafe2021
WPScan