First published: Thu Jan 11 2024(Updated: )
The Enable Media Replace plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the SHORTPIXEL_DEBUG parameter in all versions up to, and including, 4.1.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Exploiting this vulnerability requires the attacker to know the ID of an attachment uploaded by the user they are attacking.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Shortpixel Enable Media Replace | <=4.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6737 is classified as a high severity vulnerability due to its potential for reflected Cross-Site Scripting attacks.
To fix CVE-2023-6737, update the Enable Media Replace plugin to version 4.1.5 or later, which includes the necessary security improvements.
CVE-2023-6737 affects all versions of the Enable Media Replace plugin up to and including version 4.1.4.
Yes, CVE-2023-6737 can be exploited by unauthenticated attackers due to insufficient input sanitization and output escaping.
Exploitation of CVE-2023-6737 can lead to arbitrary JavaScript execution, compromising user sessions and potentially hijacking accounts.