First published: Mon Jan 08 2024(Updated: )
The Email Subscription Popup WordPress plugin before 1.2.20 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
I Thirteen Web Solution Email Subscription Popup | <1.2.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6555 is categorized as a high severity vulnerability due to its potential impact on high privilege users.
To fix CVE-2023-6555, update the Email Subscription Popup plugin to version 1.2.20 or later.
CVE-2023-6555 can be exploited through Reflected Cross-Site Scripting attacks.
High privilege users, such as administrators, are primarily affected by CVE-2023-6555.
CVE-2023-6555 is caused by the plugin's failure to properly sanitize and escape user input before rendering it on the page.