The Amazonify plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 0.8.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. However, please note that this can also be combined with CVE-2023-5818 for CSRF to XSS.
References
Configurations
History
15 Nov 2023, 15:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gara:amazonify:*:*:*:*:*:wordpress:*:* | |
First Time |
Gara amazonify
Gara |
|
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/41adfb58-d79f-40a3-8a7e-f3f08f64659f?source=cve - Third Party Advisory | |
References | () https://plugins.trac.wordpress.org/browser/amazonify/trunk/amazonify.php#L142 - Patch | |
References | () https://wordpress.org/plugins/amazonify/ - Product |
07 Nov 2023, 21:36
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-07 20:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-5819
Mitre link : CVE-2023-5819
CVE.ORG link : CVE-2023-5819
JSON object : View
Products Affected
gara
- amazonify
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')