First published: Tue Feb 20 2024(Updated: )
The Matomo Analytics – Ethical Stats. Powerful Insights. plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the idsite parameter in all versions up to, and including, 4.15.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Matomo Analytics | <=4.15.3 | |
Matomo | <5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6923 has a medium severity rating due to the potential for unauthenticated users to exploit the reflected cross-site scripting vulnerability.
To fix CVE-2023-6923, update the Matomo Analytics plugin to version 4.15.4 or later to ensure input sanitization and output escaping are properly implemented.
CVE-2023-6923 affects all versions of the Matomo Analytics plugin up to and including 4.15.3.
Yes, CVE-2023-6923 can be exploited remotely by unauthenticated attackers due to the reflected cross-site scripting vulnerability.
Exploiting CVE-2023-6923 could allow attackers to execute arbitrary JavaScript code in the context of a user’s session, leading to potential data theft or manipulation.