First published: Mon May 08 2023(Updated: )
The Cloud Manager WordPress plugin through 1.0 does not sanitise and escape the query param ricerca before outputting it in an admin panel, allowing unauthenticated attackers to trick a logged in admin to trigger a XSS payload by clicking a link.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloud Manager | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0421 has been classified as a high severity vulnerability due to its potential for XSS attacks.
To fix CVE-2023-0421, update the Cloud Manager WordPress plugin to a version beyond 1.0 that addresses this vulnerability.
Any WordPress site using the Cloud Manager plugin version 1.0 or lower is vulnerable to CVE-2023-0421.
CVE-2023-0421 facilitates Cross-Site Scripting (XSS) attacks through unescaped query parameters.
It is unsafe to use the Cloud Manager plugin version 1.0 or lower until the vulnerability CVE-2023-0421 is patched.