First published: Thu Nov 30 2023(Updated: )
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Molongui Author Box, Guest Author and Co-Authors for Your Posts – Molongui allows Stored XSS.This issue affects Author Box, Guest Author and Co-Authors for Your Posts – Molongui: from n/a through 4.6.19.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amitzy Molongui | <=4.6.19 |
Update to 4.6.20 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-39921 is medium with a severity value of 5.9.
The vulnerability is a Cross-Site Scripting (XSS) vulnerability that allows for stored XSS.
The affected software versions are Molongui Author Box, Guest Author and Co-Authors for Your Posts – Molongui version up to and including 4.6.19.
To fix the vulnerability, ensure that you update the Molongui Author Box, Guest Author and Co-Authors for Your Posts – Molongui plugin to version 4.6.20 or later.
You can find more information about CVE-2023-39921 at the following reference: [link](https://patchstack.com/database/vulnerability/molongui-authorship/wordpress-author-box-for-authors-co-authors-multiple-authors-and-guest-authors-molongui-plugin-4-6-19-cross-site-scripting-xss-vulnerability?_s_id=cve)