First published: Mon Aug 07 2023(Updated: )
The Bubble Menu WordPress plugin before 3.0.5 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wow-company Bubble Menu | <3.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Bubble Menu WordPress plugin vulnerability is CVE-2023-3650.
The severity of CVE-2023-3650 is medium with a severity value of 4.8.
The affected software for CVE-2023-3650 is the Bubble Menu WordPress plugin before version 3.0.5.
CVE-2023-3650 is a Stored Cross-Site Scripting (XSS) vulnerability.
The Bubble Menu WordPress plugin vulnerability can be exploited by high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.