CVE-2023-39988
WordPress WxSync Plugin <= 2.7.23 is vulnerable to Cross Site Scripting (XSS)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in 标准云(std.Cloud) WxSync plugin <= 2.7.23 versions.
Se ha encontrado una vulnerabilidad de Cross-Site Scripting (XSS) reflejado y autenticado (con permisos de contribuidor o superiores) en el plugin WxSync en versiones anteriores e incluyendo la 2.7.23.
The WxSync plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.8.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in 标准云(std.Cloud) WxSync plugin <= 2.7.23 versions.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-08-08 CVE Reserved
- 2023-08-09 CVE Published
- 2025-03-18 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
- CAPEC-592: Stored XSS
References (1)
URL | Tag | Source |
---|---|---|
https://patchstack.com/database/vulnerability/wxsync/wordpress-wxsync-plugin-2-7-23-cross-site-scripting-xss?_s_id=cve | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|