First published: Tue Jun 27 2023(Updated: )
The Ultimate Product Catalog WordPress plugin before 5.2.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Etoile Web Design Ultimate Product Catalogue | <5.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-2711.
The severity level of CVE-2023-2711 is medium with a score of 4.8.
CVE-2023-2711 allows high privilege users to perform Stored Cross-Site Scripting attacks, even when the unfiltered_html capability is disallowed.
The Ultimate Product Catalog WordPress plugin before version 5.2.6 is affected by CVE-2023-2711.
Yes, updating to version 5.2.6 of the Ultimate Product Catalog WordPress plugin will fix CVE-2023-2711.