First published: Fri Oct 13 2023(Updated: )
Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions.
Credit: audit@patchstack.com audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress WordPress | >=5.9<=5.9.7 | |
WordPress WordPress | >=6.0<=6.0.5 | |
WordPress WordPress | >=6.1<=6.1.3 | |
WordPress WordPress | >=6.2<=6.2.2 | |
WordPress WordPress | >=6.3<=6.3.1 | |
Wordpress Gutenberg | <=16.8.0 |
Update WordPress core to the 6.3.2, 6.2.3, 6.1.4, 6.0.6, 5.9.8 or a higher version.
Update Gutenberg to 16.8.1 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-38000.
The severity of CVE-2023-38000 is medium with a severity value of 5.4.
WordPress core versions 5.9 through 6.3.1 and Gutenberg plugin up to version 16.8.0 are affected by CVE-2023-38000.
CVE-2023-38000 is a stored Cross-Site Scripting (XSS) vulnerability that allows attackers with contributor+ privileges to inject malicious scripts into web pages viewed by other users, potentially leading to unauthorized actions or theft of sensitive information.
To fix the CVE-2023-38000 vulnerability, it is recommended to update to WordPress core version 6.3.2 or apply the necessary security patches provided by the WordPress team. Additionally, updating the Gutenberg plugin to the latest version is also recommended.