CVE-2023-6737

The Enable Media Replace plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the SHORTPIXEL_DEBUG parameter in all versions up to, and including, 4.1.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Exploiting this vulnerability requires the attacker to know the ID of an attachment uploaded by the user they are attacking.
Configurations

Configuration 1 (hide)

cpe:2.3:a:shortpixel:enable_media_replace:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 08:44

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3010103%40enable-media-replace%2Ftrunk&old=2990561%40enable-media-replace%2Ftrunk&sfp_email=&sfph_mail= - Patch () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3010103%40enable-media-replace%2Ftrunk&old=2990561%40enable-media-replace%2Ftrunk&sfp_email=&sfph_mail= - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/c37d8218-6059-46f2-a5d9-d7c22486211e?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/c37d8218-6059-46f2-a5d9-d7c22486211e?source=cve - Third Party Advisory
CVSS v2 : unknown
v3 : 6.1
v2 : unknown
v3 : 4.7

17 Jan 2024, 20:38

Type Values Removed Values Added
CWE CWE-79
CVSS v2 : unknown
v3 : 4.7
v2 : unknown
v3 : 6.1
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3010103%40enable-media-replace%2Ftrunk&old=2990561%40enable-media-replace%2Ftrunk&sfp_email=&sfph_mail= - () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3010103%40enable-media-replace%2Ftrunk&old=2990561%40enable-media-replace%2Ftrunk&sfp_email=&sfph_mail= - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/c37d8218-6059-46f2-a5d9-d7c22486211e?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/c37d8218-6059-46f2-a5d9-d7c22486211e?source=cve - Third Party Advisory
First Time Shortpixel
Shortpixel enable Media Replace
CPE cpe:2.3:a:shortpixel:enable_media_replace:*:*:*:*:*:wordpress:*:*

11 Jan 2024, 13:57

Type Values Removed Values Added
Summary
  • (es) El complemento Enable Media Replace para WordPress es vulnerable a Cross-Site Scripting reflejado a través del parámetro SHORTPIXEL_DEBUG en todas las versiones hasta la 4.1.4 incluida debido a una sanitización de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en páginas que se ejecutan si logran engañar a un usuario para que realice una acción como hacer clic en un enlace. Explotar esta vulnerabilidad requiere que el atacante conozca el ID de un archivo adjunto subido por el usuario al que está atacando.

11 Jan 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-11 09:15

Updated : 2024-11-21 08:44


NVD link : CVE-2023-6737

Mitre link : CVE-2023-6737

CVE.ORG link : CVE-2023-6737


JSON object : View

Products Affected

shortpixel

  • enable_media_replace
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')