The Reusable Text Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'text-blocks' shortcode in versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with author-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/reusable-text-blocks/tags/1.5.3/text-blocks.php#L319 | Release Notes |
https://www.wordfence.com/threat-intel/vulnerabilities/id/0d627ee7-1175-4621-a477-1e9ec2d05eee?source=cve | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-10-24T13:52:58.188Z
Updated: 2023-10-24T13:52:58.188Z
Reserved: 2023-10-24T01:32:59.887Z
Link: CVE-2023-5745
JSON object: View
NVD Information
Status : Modified
Published: 2023-10-25T18:17:44.700
Modified: 2023-11-07T04:24:19.407
Link: CVE-2023-5745
JSON object: View
Redhat Information
No data.
CWE