The Qubely WordPress plugin before 1.8.5 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: WPScan

Published: 2024-01-16T15:55:51.086Z

Updated: 2024-01-16T15:55:51.086Z

Reserved: 2023-01-18T07:22:43.292Z


Link: CVE-2023-0376

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2024-01-16T16:15:10.487

Modified: 2024-01-22T19:51:19.510


Link: CVE-2023-0376

JSON object: View

cve-icon Redhat Information

No data.

CWE