First published: Tue Feb 27 2024(Updated: )
The Page Builder: Pagelayer WordPress plugin before 1.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pagelayer | <1.8.1 | |
Pagelayer | <1.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7115 has a high severity rating due to the potential for Stored Cross-Site Scripting (XSS) attacks by privileged users.
To fix CVE-2023-7115, update the Pagelayer WordPress plugin to version 1.8.1 or later.
CVE-2023-7115 affects users of the Pagelayer plugin on WordPress installations prior to version 1.8.1.
CVE-2023-7115 can be exploited for Stored Cross-Site Scripting attacks, allowing malicious scripts to be executed within user browsers.
The impact of CVE-2023-7115 includes the potential for unauthorized data access and control over affected websites by executing malicious scripts.