First published: Tue Jan 09 2024(Updated: )
The WordPress Button Plugin MaxButtons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 9.7.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Administrators can give button creation privileges to users with lower levels (contributor+) which would allow those lower-privileged users to carry out attacks.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
MaxButtons | <=9.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6594 is classified as a high severity vulnerability due to its potential for stored cross-site scripting attacks.
To fix CVE-2023-6594, upgrade the MaxButtons plugin to version 9.7.5 or higher, which addresses the input sanitization issue.
CVE-2023-6594 affects all versions of the MaxButtons plugin for WordPress up to and including 9.7.4.
CVE-2023-6594 is a stored cross-site scripting vulnerability that can be exploited by authenticated attackers.
No, CVE-2023-6594 can only be exploited by authenticated users with administrator privileges.