The Greenshift WordPress plugin before 5.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
History

Wed, 12 Mar 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2023-02-21T08:50:43.727Z

Updated: 2025-03-12T20:30:26.024Z

Reserved: 2023-01-18T07:25:33.903Z

Link: CVE-2023-0378

cve-icon Vulnrichment

Updated: 2024-08-02T05:10:55.649Z

cve-icon NVD

Status : Modified

Published: 2023-02-21T09:15:12.600

Modified: 2025-03-12T21:15:40.490

Link: CVE-2023-0378

cve-icon Redhat

No data.