First published: Mon Nov 06 2023(Updated: )
The Awesome Support WordPress plugin before 6.1.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Awesome Support | <6.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-5354.
The severity of CVE-2023-5354 is medium with a severity value of 6.1.
CVE-2023-5354 is a reflected cross-site scripting vulnerability in the Awesome Support WordPress plugin before version 6.1.5, allowing an attacker to execute malicious scripts on the affected pages.
The affected software by CVE-2023-5354 is the Awesome Support plugin for WordPress versions up to and excluding 6.1.5.
To mitigate CVE-2023-5354, it is recommended to update to version 6.1.5 or newer of the Awesome Support plugin for WordPress.