CVE-2023-5577

The Bitly's plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpbitly' shortcode in all versions up to, and including, 2.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bitly:bitly:*:*:*:*:*:wordpress:*:*

History

21 Jan 2024, 03:09

Type Values Removed Values Added
CPE cpe:2.3:a:bitly:wp-bitly:*:*:*:*:*:wordpress:*:* cpe:2.3:a:bitly:bitly:*:*:*:*:*:wordpress:*:*
First Time Bitly bitly
References () https://plugins.trac.wordpress.org/browser/wp-bitly/trunk/includes/class-wp-bitly-shortlink.php?rev=2767772#L238 - Product () https://plugins.trac.wordpress.org/browser/wp-bitly/trunk/includes/class-wp-bitly-shortlink.php?rev=2767772#L238 - Issue Tracking

14 Nov 2023, 19:10

Type Values Removed Values Added
CPE cpe:2.3:a:bitly:wp-bitly:*:*:*:*:*:wordpress:*:*
References () https://plugins.trac.wordpress.org/browser/wp-bitly/trunk/includes/class-wp-bitly-shortlink.php?rev=2767772#L238 - () https://plugins.trac.wordpress.org/browser/wp-bitly/trunk/includes/class-wp-bitly-shortlink.php?rev=2767772#L238 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/31522e54-f260-46d0-8d57-2d46af7d3450?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/31522e54-f260-46d0-8d57-2d46af7d3450?source=cve - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
First Time Bitly
Bitly wp-bitly
CWE CWE-79

07 Nov 2023, 13:58

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-07 12:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-5577

Mitre link : CVE-2023-5577

CVE.ORG link : CVE-2023-5577


JSON object : View

Products Affected

bitly

  • bitly
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')