First published: Sat Aug 24 2024(Updated: )
The String locator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sql-column' parameter in all versions up to, and including, 2.6.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This required WP_DEBUG to be enabled in order to be exploited.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
String Locator | <2.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-6987 is considered high due to its potential for reflected cross-site scripting vulnerabilities that affect unauthenticated users.
To fix CVE-2023-6987, update the String Locator plugin to version 2.6.6 or later, which addresses the input sanitization issues.
All users of the String Locator plugin for WordPress prior to version 2.6.6 are affected by CVE-2023-6987.
CVE-2023-6987 is a reflected cross-site scripting (XSS) vulnerability due to insufficient input sanitization and output escaping.
No, CVE-2023-6987 can be exploited by unauthenticated attackers, making it particularly risky for websites using this plugin.