The POWR plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'powr-powr-pack' shortcode in all versions up to, and including, 2.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/powr-pack/trunk/src/pack.php?rev=2821707#L198 | Release Notes |
https://plugins.trac.wordpress.org/browser/powr-pack/trunk/src/pack.php?rev=2821707#L201 | Release Notes |
https://www.wordfence.com/threat-intel/vulnerabilities/id/c2967eae-82bb-4556-a21a-c5bb6b905c62?source=cve | Product Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-11-13 08:15
Updated : 2023-11-17 13:57
NVD link : CVE-2023-5741
Mitre link : CVE-2023-5741
CVE.ORG link : CVE-2023-5741
JSON object : View
Products Affected
powr
- powr
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')