CVE-2023-6697

CVSS 3.1 Score 6.1 of 10 (medium)

Details

Published Jan 24, 2024
Updated: Jan 30, 2024
CWE ID 79

Summary

CVE-2023-6697 is a vulnerability in the WP Go Maps plugin for WordPress, affecting all versions up to and including 9.0.28. The vulnerability allows for Reflected Cross-Site Scripting via the map id parameter due to insufficient input sanitization and output escaping. Attackers can exploit this vulnerability by tricking a user into performing an action, such as clicking on a link, which then enables them to inject arbitrary web scripts into pages that execute. The severity of this vulnerability is rated as MEDIUM, with a base score of 6.1 according to NIST's National Vulnerability Database (NVD). It requires user interaction and has a low impact on integrity and confidentiality. Organizations using the WP Go Maps plugin should update to a version beyond 9.0.28 to remediate this vulnerability and mitigate potential risks associated with it.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-6697 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions