
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2023-0058 affects the WordPress plugin Tiempo.com versions 0.1.2 and below. This security flaw was discovered and publicly disclosed on April 25, 2023, by security researcher Shreya Pohekar (WPScan).
The vulnerability is classified as a Stored Cross-Site Scripting (XSS) via Cross-Site Request Forgery (CSRF) with a CVSS score of 7.1 (High). The technical issue stems from the plugin's lack of CSRF checks when creating and editing shortcodes, combined with missing sanitization and escaping mechanisms. The vulnerability is tracked under CWE-79 and falls under the OWASP Top 10 category A7: Cross-Site Scripting (XSS) (WPScan).
This vulnerability could allow attackers to execute a CSRF attack that results in stored XSS payloads being added to the system through a logged-in administrator's account. The successful exploitation could lead to compromised website integrity and potential execution of malicious scripts in users' browsers (WPScan).
As of the vulnerability disclosure, there is no known fix available for this security issue. Website administrators using the affected Tiempo.com plugin should consider either removing the plugin or implementing additional security controls to mitigate the risk (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."