Vulnerability Description
The WP Font Awesome WordPress plugin before 1.7.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embedded, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wp Font Awesome Project | Wp Font Awesome | < 1.7.9 |
References
- https://wpscan.com/vulnerability/fd7aaf06-4be7-48d6-83a1-cd5cd6c3d9c2ExploitThird Party Advisory
- https://wpscan.com/vulnerability/fd7aaf06-4be7-48d6-83a1-cd5cd6c3d9c2ExploitThird Party Advisory
FAQ
What is CVE-2023-0271?
CVE-2023-0271 is a vulnerability with a CVSS score of 5.4 (MEDIUM). The WP Font Awesome WordPress plugin before 1.7.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embedded, which could ...
How severe is CVE-2023-0271?
CVE-2023-0271 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-0271?
Check the references section above for vendor advisories and patch information. Affected products include: Wp Font Awesome Project Wp Font Awesome.