CVSS 3.1 Score 6.1 of 10 (medium)


Published Jan 24, 2024
Updated: Jan 30, 2024


CVE-2023-6697 is a vulnerability in the WP Go Maps plugin for WordPress, affecting all versions up to and including 9.0.28. The vulnerability allows for Reflected Cross-Site Scripting via the map id parameter due to insufficient input sanitization and output escaping. Attackers can exploit this vulnerability by tricking a user into performing an action, such as clicking on a link, which then enables them to inject arbitrary web scripts into pages that execute. The severity of this vulnerability is rated as MEDIUM, with a base score of 6.1 according to NIST's National Vulnerability Database (NVD). It requires user interaction and has a low impact on integrity and confidentiality. Organizations using the WP Go Maps plugin should update to a version beyond 9.0.28 to remediate this vulnerability and mitigate potential risks associated with it.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-6697 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options