First published: Wed Oct 18 2023(Updated: )
The Thumbnail Slider With Lightbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Title field in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5621 is a vulnerability in the Thumbnail Slider With Lightbox plugin for WordPress that allows for Stored Cross-Site Scripting attacks.
CVE-2023-5621 affects versions up to and including 1.0 of the Thumbnail Slider With Lightbox plugin for WordPress.
CVE-2023-5621 has a severity rating of medium with a CVSS score of 4.4.
An authenticated attacker with administrator-level privileges can exploit CVE-2023-5621 by injecting malicious code into the Image Title field.
At the moment, there are no specific fixes or patches available for CVE-2023-5621. It is recommended to update to the latest version of the Thumbnail Slider With Lightbox plugin and to regularly monitor official sources for any security updates.