First published: Mon Aug 21 2023(Updated: )
The Bit Assist WordPress plugin before 1.1.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bitapps Bit Assist | <1.1.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3667 has been classified as a high severity vulnerability due to its potential for Stored Cross-Site Scripting attacks.
To fix CVE-2023-3667, update the Bit Assist WordPress plugin to version 1.1.9 or higher.
CVE-2023-3667 affects users of the Bit Assist WordPress plugin version before 1.1.9, particularly high privilege users like administrators.
CVE-2023-3667 allows for Stored Cross-Site Scripting attacks that could compromise user data and site integrity.
Yes, CVE-2023-3667 can be exploited in multisite setups even when the unfiltered_html capability is disallowed.