CVSS 3.1 Score 5.4 of 10 (medium)


Published Jan 11, 2024
Updated: Jan 17, 2024


CVE-2023-6624 is a vulnerability found in the Import and export users and customers plugin for WordPress, affecting all versions up to and including 1.24.3. The vulnerability is due to insufficient input sanitization and output escaping on user supplied attributes, making it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts into pages. This can lead to stored cross-site scripting attacks where the injected scripts execute whenever a user accesses the affected page. The vulnerability has a risk score of 26 and a base severity of MEDIUM according to NVD, with an exploitability score of 2.3. The recommended remediation for this vulnerability is to update the plugin to a version that includes proper input sanitization and output escaping mechanisms. If left unpatched, this vulnerability poses a potential danger to organizations using the affected WordPress plugin, as it can be exploited by attackers to compromise the integrity of web pages and potentially steal sensitive information from users.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-6624 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options