The Theme Switcha plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'theme_switcha_list' shortcode in all versions up to, and including, 3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Configurations
History
21 Nov 2024, 08:42
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.4 |
References | () https://plugins.trac.wordpress.org/browser/theme-switcha/tags/3.3/inc/plugin-core.php#L445 - Patch | |
References | () https://plugins.trac.wordpress.org/changeset/2979783/theme-switcha#file1 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/2b0937fe-3ea6-427a-aef7-539c08687abb?source=cve - Third Party Advisory |
Information
Published : 2023-10-20 05:15
Updated : 2024-11-21 08:42
NVD link : CVE-2023-5614
Mitre link : CVE-2023-5614
CVE.ORG link : CVE-2023-5614
JSON object : View
Products Affected
plugin-planet
- theme_switcha
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')