CVE-2023-6624

CVSS 3.1 Score 5.4 of 10 (medium)

Details

Published Jan 11, 2024
Updated: Jan 17, 2024
CWE ID 79

Summary

CVE-2023-6624 is a vulnerability found in the Import and export users and customers plugin for WordPress, affecting all versions up to and including 1.24.3. The vulnerability is due to insufficient input sanitization and output escaping on user supplied attributes, making it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts into pages. This can lead to stored cross-site scripting attacks where the injected scripts execute whenever a user accesses the affected page. The vulnerability has a risk score of 26 and a base severity of MEDIUM according to NVD, with an exploitability score of 2.3. The recommended remediation for this vulnerability is to update the plugin to a version that includes proper input sanitization and output escaping mechanisms. If left unpatched, this vulnerability poses a potential danger to organizations using the affected WordPress plugin, as it can be exploited by attackers to compromise the integrity of web pages and potentially steal sensitive information from users.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-6624 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions