First published: Tue Oct 31 2023(Updated: )
The Popup box WordPress plugin before 3.7.2 does not sanitize and escape some Popup fields, which could allow high-privilege users such as an administrator to inject arbitrary web scripts even when the unfiltered_html capability is disallowed (for example in a multisite setup).
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ays-pro Popup Like Box | <3.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-4390 is medium with a CVSS score of 4.8.
The Popup box < 3.7.2 - Admin+ Stored Cross-Site Scripting vulnerability allows high-privilege users to inject arbitrary web scripts in WordPress, even when the unfiltered_html capability is disallowed.
The affected version of the Popup box plugin is version 3.7.2 and below.
An attacker can exploit CVE-2023-4390 by injecting arbitrary web scripts through the Popup fields in the vulnerable version of the Popup box plugin.
Yes, upgrading to version 3.7.2 of the Popup box plugin or applying the necessary patches will fix the vulnerability.