The POWR plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'powr-powr-pack' shortcode in all versions up to, and including, 2.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Wed, 08 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2023-11-13T07:31:16.052Z

Updated: 2025-01-08T21:32:03.419Z

Reserved: 2023-10-24T01:31:06.094Z

Link: CVE-2023-5741

cve-icon Vulnrichment

Updated: 2024-08-02T08:07:32.623Z

cve-icon NVD

Status : Modified

Published: 2023-11-13T08:15:26.317

Modified: 2024-11-21T08:42:23.550

Link: CVE-2023-5741

cve-icon Redhat

No data.