The RapidExpCart WordPress plugin through 1.0 does not sanitize and escape the url parameter in the rapidexpcart endpoint before storing it and outputting it back in the page, leading to a Stored Cross-Site Scripting vulnerability which could be used against high-privilege users such as admin, furthermore lack of csrf protection means an attacker can trick a logged in admin to perform the attack by submitting a hidden form.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-12565 The RapidExpCart WordPress plugin through 1.0 does not sanitize and escape the url parameter in the rapidexpcart endpoint before storing it and outputting it back in the page, leading to a Stored Cross-Site Scripting vulnerability which could be used against high-privilege users such as admin, furthermore lack of csrf protection means an attacker can trick a logged in admin to perform the attack by submitting a hidden form.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 24 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2025-01-24T20:55:12.178Z

Reserved: 2023-01-26T19:49:20.584Z

Link: CVE-2023-0520

cve-icon Vulnrichment

Updated: 2024-08-02T05:17:49.376Z

cve-icon NVD

Status : Modified

Published: 2023-05-15T13:15:09.810

Modified: 2025-01-24T21:15:08.310

Link: CVE-2023-0520

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.