CVE-2023-5161

The Modal Window plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 5.3.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wow-company:modal_window:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 08:41

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/modal-window/tags/5.3.5/public/class-public.php#L73 - Product () https://plugins.trac.wordpress.org/browser/modal-window/tags/5.3.5/public/class-public.php#L73 - Product
References () https://plugins.trac.wordpress.org/browser/modal-window/tags/5.3.5/public/shortcode.php#L53 - Product () https://plugins.trac.wordpress.org/browser/modal-window/tags/5.3.5/public/shortcode.php#L53 - Product
References () https://plugins.trac.wordpress.org/changeset/2971132/modal-window#file195 - Patch () https://plugins.trac.wordpress.org/changeset/2971132/modal-window#file195 - Patch
References () https://plugins.trac.wordpress.org/changeset/2971132/modal-window#file196 - Patch () https://plugins.trac.wordpress.org/changeset/2971132/modal-window#file196 - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/48e2129f-6a2c-45e4-a0cf-7d8d5f563a7f?source=cve - Patch, Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/48e2129f-6a2c-45e4-a0cf-7d8d5f563a7f?source=cve - Patch, Third Party Advisory
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 6.4

07 Nov 2023, 04:23

Type Values Removed Values Added
CWE CWE-79

29 Sep 2023, 15:44

Type Values Removed Values Added
CPE cpe:2.3:a:wow-company:modal_window:*:*:*:*:*:wordpress:*:*
References (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/48e2129f-6a2c-45e4-a0cf-7d8d5f563a7f?source=cve - (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/48e2129f-6a2c-45e4-a0cf-7d8d5f563a7f?source=cve - Patch, Third Party Advisory
References (MISC) https://plugins.trac.wordpress.org/browser/modal-window/tags/5.3.5/public/shortcode.php#L53 - (MISC) https://plugins.trac.wordpress.org/browser/modal-window/tags/5.3.5/public/shortcode.php#L53 - Product
References (MISC) https://plugins.trac.wordpress.org/changeset/2971132/modal-window#file196 - (MISC) https://plugins.trac.wordpress.org/changeset/2971132/modal-window#file196 - Patch
References (MISC) https://plugins.trac.wordpress.org/changeset/2971132/modal-window#file195 - (MISC) https://plugins.trac.wordpress.org/changeset/2971132/modal-window#file195 - Patch
References (MISC) https://plugins.trac.wordpress.org/browser/modal-window/tags/5.3.5/public/class-public.php#L73 - (MISC) https://plugins.trac.wordpress.org/browser/modal-window/tags/5.3.5/public/class-public.php#L73 - Product
CVSS v2 : unknown
v3 : 6.4
v2 : unknown
v3 : 5.4
First Time Wow-company modal Window
Wow-company

27 Sep 2023, 15:19

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-27 15:19

Updated : 2024-11-21 08:41


NVD link : CVE-2023-5161

Mitre link : CVE-2023-5161

CVE.ORG link : CVE-2023-5161


JSON object : View

Products Affected

wow-company

  • modal_window
CWE

No CWE.