The Reusable Text Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'text-blocks' shortcode in versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with author-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/reusable-text-blocks/tags/1.5.3/text-blocks.php#L319 | Release Notes |
https://www.wordfence.com/threat-intel/vulnerabilities/id/0d627ee7-1175-4621-a477-1e9ec2d05eee?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-10-25 18:17
Updated : 2023-11-07 04:24
NVD link : CVE-2023-5745
Mitre link : CVE-2023-5745
CVE.ORG link : CVE-2023-5745
JSON object : View
Products Affected
halgatewood
- reusable_text_blocks
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')