cve/2023/CVE-2023-4811.md

18 lines
776 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-4811](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4811)
![](https://img.shields.io/static/v1?label=Product&message=WordPress%20File%20Upload&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%204.23.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WordPress File Upload WordPress plugin before 4.23.3 does not sanitise and escape some of its settings, which could allow high privilege users such as contributors to perform Stored Cross-Site Scripting attacks.
### POC
#### Reference
- https://wpscan.com/vulnerability/7f9271f2-4de4-4be3-8746-2a3f149eb1d1
#### Github
No PoCs found on GitHub currently.