CVE-2023-0490

The f(x) TOC WordPress plugin through 1.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:f\(x\)_toc_project:f\(x\)_toc:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:37

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/9b497d21-f075-41a9-afec-3e24034c8c63 - Exploit () https://wpscan.com/vulnerability/9b497d21-f075-41a9-afec-3e24034c8c63 - Exploit

23 May 2023, 15:43

Type Values Removed Values Added
References (MISC) https://wpscan.com/vulnerability/9b497d21-f075-41a9-afec-3e24034c8c63 - (MISC) https://wpscan.com/vulnerability/9b497d21-f075-41a9-afec-3e24034c8c63 - Exploit
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:f\(x\)_toc_project:f\(x\)_toc:*:*:*:*:*:wordpress:*:*

15 May 2023, 13:26

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-15 13:15

Updated : 2025-01-14 20:15


NVD link : CVE-2023-0490

Mitre link : CVE-2023-0490

CVE.ORG link : CVE-2023-0490


JSON object : View

Products Affected

f\(x\)_toc_project

  • f\(x\)_toc
CWE

No CWE.