CVE-2023-0431

The File Away WordPress plugin through 3.9.9.0.1 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:file_away_project:file_away:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:37

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/fdcbd9a3-552d-439e-b283-1d3d934889af - Third Party Advisory () https://wpscan.com/vulnerability/fdcbd9a3-552d-439e-b283-1d3d934889af - Third Party Advisory

17 Jun 2023, 01:38

Type Values Removed Values Added
CPE cpe:2.3:a:file_away_project:file_away:*:*:*:*:*:wordpress:*:*
References (MISC) https://wpscan.com/vulnerability/fdcbd9a3-552d-439e-b283-1d3d934889af - (MISC) https://wpscan.com/vulnerability/fdcbd9a3-552d-439e-b283-1d3d934889af - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4

12 Jun 2023, 18:22

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-12 18:15

Updated : 2024-11-21 07:37


NVD link : CVE-2023-0431

Mitre link : CVE-2023-0431

CVE.ORG link : CVE-2023-0431


JSON object : View

Products Affected

file_away_project

  • file_away
CWE

No CWE.