cve/2023/CVE-2023-5653.md

18 lines
799 B
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-5653](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5653)
![](https://img.shields.io/static/v1?label=Product&message=WassUp%20Real%20Time%20Analytics&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WassUp Real Time Analytics WordPress plugin through 1.9.4.5 does not escape IP address provided via some headers before outputting them back in an admin page, allowing unauthenticated users to perform Stored XSS attacks against logged in admins
### POC
#### Reference
- https://wpscan.com/vulnerability/76316621-1987-44ea-83e5-6ca884bdd1c0
#### Github
No PoCs found on GitHub currently.