First published: Sat Sep 30 2023(Updated: )
The Blog Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'vivafbcomment' shortcode in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Awplife Blog Filter | <=1.4 | |
<=1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5295 is medium.
The vulnerability ID for the Blog Filter plugin for WordPress is CVE-2023-5295.
The affected software for CVE-2023-5295 is Awplife Blog Filter plugin for WordPress v1.4 and below.
An attacker can exploit CVE-2023-5295 by using the 'vivafbcomment' shortcode to inject malicious code in user supplied attributes.
Yes, upgrading to a version higher than 1.4 of the Awplife Blog Filter plugin for WordPress will fix CVE-2023-5295.