First published: Tue Jun 27 2023(Updated: )
The ERP WordPress plugin before 1.12.4 does not sanitise and escape the employee_name parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wedevs Wp Erp | <1.12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2743 refers to a vulnerability in the ERP WordPress plugin before version 1.12.4 that allows for Reflected Cross-Site Scripting attacks.
CVE-2023-2743 affects the ERP WordPress plugin before version 1.12.4 by not properly sanitizing and escaping the 'employee_name' parameter, leading to potential XSS attacks.
The severity of CVE-2023-2743 is medium, with a CVSS score of 6.1.
CVE-2023-2743 can be exploited by an attacker injecting malicious code into the 'employee_name' parameter, which is then reflected back in the page and executed by high privilege users such as admin.
To fix CVE-2023-2743, it is recommended to update the ERP WordPress plugin to version 1.12.4 or later, which includes proper sanitization and escaping of the 'employee_name' parameter.