The CPO Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of its content type settings parameters in versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | CPO Companion <= 1.0.4 - Authenticated (Administrator+) Stored Cross-Site Scripting | |
| Weaknesses | CWE-79 | |
| References |
|
Mon, 13 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-01-10T17:14:45.568Z
Updated: 2026-04-08T17:09:16.663Z
Reserved: 2023-01-10T17:14:41.169Z
Link: CVE-2023-0162
Updated: 2024-08-02T05:02:43.631Z
Status : Modified
Published: 2023-01-10T18:15:10.593
Modified: 2026-04-08T18:17:41.480
Link: CVE-2023-0162
No data.