CVE-2023-23979 - Quick Event Manager <= 9.7.4 Unauthenticated Stored Cross Site Scripting
Researcher
This vulnerability was discovered by @yuyudhn.
Description
The Quick Event Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘yourname’ parameter in versions up to, and including, 9.7.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Details
Detail about software affected by CVE-2023-23979.
Parameter | Description |
---|---|
Software | Quick Event Manager |
Type | WordPress Plugin |
Developer | Fullworks |
Plugin URL | https://wordpress.org/plugins/quick-event-manager/ |
Vulnerable Version | <= 9.7.4 |
Classification | Cross Site Scripting (XSS) |
Required privilege | Unauthenticated |
Publicly disclosed | 20.01.2023 |
Proof of Concept
Not published yet.
References
- CVE-2023-23979 - Wordfence
- https://www.cve.org/CVERecord?id=CVE-2023-23979