CVSS 3.1 Score 7.1 of 10 (high)


Published Nov 22, 2023
Updated: Nov 29, 2023


CVE-2023-30496 is a vulnerability classified as CWE-79, which refers to an 'Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')' issue. It affects the MagePeople Team WpBusTicketly plugin versions up to 5.2.5. The vulnerability has a base severity rating of HIGH with a base score of 7.1 according to [email protected]. The exploitability score is 2.8, and it requires user interaction. The attack vector is through the network, and the impact on integrity and confidentiality is low. The vulnerability poses a potential danger to organizations that use the affected plugin as it could allow attackers to inject malicious scripts into web pages, leading to various security risks such as data theft, unauthorized access, or defacement of websites. To remediate this vulnerability, users should update the MagePeople Team WpBusTicketly plugin to a version that includes a fix for CVE-2023-30496 or apply any available patches provided by the plugin vendor.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-30496 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options