CVE-2023-1602

The Short URL plugin for WordPress is vulnerable to stored Cross-Site Scripting via the 'comment' parameter due to insufficient input sanitization and output escaping in versions up to, and including, 1.6.4. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:kaizencoders:short_url:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:39

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 4.8
v2 : unknown
v3 : 4.4
References () https://plugins.trac.wordpress.org/changeset/2931815/shorten-url/trunk/shorten-url.php - Patch () https://plugins.trac.wordpress.org/changeset/2931815/shorten-url/trunk/shorten-url.php - Patch
References () https://wordpress.org/plugins/shorten-url/#developers - Release Notes () https://wordpress.org/plugins/shorten-url/#developers - Release Notes
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/a5f29f35-da79-4389-a0a5-a1be0b0b8996?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/a5f29f35-da79-4389-a0a5-a1be0b0b8996?source=cve - Third Party Advisory

Information

Published : 2023-06-29 02:15

Updated : 2024-11-21 07:39


NVD link : CVE-2023-1602

Mitre link : CVE-2023-1602

CVE.ORG link : CVE-2023-1602


JSON object : View

Products Affected

kaizencoders

  • short_url
CWE

No CWE.