First published: Mon Nov 20 2023(Updated: )
The PubyDoc WordPress plugin through 2.0.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pubydoc Pubydoc | <=2.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-4970 is medium with a CVSS score of 4.8.
CVE-2023-4970 allows high privilege users, such as admins, to perform Stored XSS attacks in the PubyDoc WordPress plugin version 2.0.6 and below.
An attacker can exploit CVE-2023-4970 by injecting malicious code through the plugin's unsanitized settings, allowing them to execute arbitrary scripts in a victim's browser.
No, high privilege users like admin have more capabilities, but other authenticated users with sufficient privileges can also exploit the vulnerability.
To mitigate CVE-2023-4970, update the PubyDoc WordPress plugin to version 2.0.7 or higher, which includes the necessary sanitization and escaping of settings to prevent the vulnerability.