The Simple Table Manager WordPress plugin through 1.5.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/nightcloudos/bug_report/blob/main/vendors/poc2.md | Exploit Third Party Advisory | 
| https://wpscan.com/vulnerability/ef8029e0-9282-401a-a77d-10b6656adaa6 | Exploit Third Party Advisory | 
| https://github.com/nightcloudos/bug_report/blob/main/vendors/poc2.md | Exploit Third Party Advisory | 
| https://wpscan.com/vulnerability/ef8029e0-9282-401a-a77d-10b6656adaa6 | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 08:36
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-11-06 21:15
Updated : 2025-02-26 22:15
NVD link : CVE-2023-4858
Mitre link : CVE-2023-4858
CVE.ORG link : CVE-2023-4858
JSON object : View
Products Affected
                topcode
- simple_table_manager
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
