First published: Tue Nov 14 2023(Updated: )
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Sajjad Hossain Sagor WP Edit Username plugin <= 1.0.5 versions.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sajjad67 Wp Edit Username | <=1.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-47528 is medium with a CVSS score of 5.9.
The affected software of CVE-2023-47528 is the WP Edit Username plugin version 1.0.5 and below.
CVE-2023-47528 is a stored Cross-Site Scripting (XSS) vulnerability in the WP Edit Username plugin version 1.0.5 and below, allowing authenticated users with admin+ privileges to inject malicious code.
To fix CVE-2023-47528, it is recommended to upgrade to the latest version of the WP Edit Username plugin or apply any available patches or fixes provided by the plugin developer.
Yes, you can find more information about CVE-2023-47528 at this reference link: https://patchstack.com/database/vulnerability/wp-edit-username/wordpress-wp-edit-username-plugin-1-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve