Oqt+3CCVE-2023-0968

CVE-2023-0968
WordPress 5FOqC0

6/dCYd

The Watu Quiz WordPress plugin versions prior to 3.3.9.1 contained a Reflected Cross-Site Scripting (XSS) vulnerability, identified as CVE-2023-0968. The vulnerability was discovered by security researcher Marco Wotschka and publicly disclosed on March 3, 2023. The issue stemmed from insufficient input sanitization and output escaping in the plugin's functionality (WPScan).

69Gavs

The vulnerability exists due to improper sanitization and escaping of several parameters including email, dn, date, and points before they are output back to the page. The CVSS score for this vulnerability ranges from 6.1 (Medium) to 7.5 (High), with the CVSS vector being CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. This indicates that the vulnerability is network-accessible, requires low attack complexity, needs no privileges, but does require user interaction (Wordfence Report).

k4I7F8

The vulnerability could be exploited by unauthenticated attackers to inject arbitrary web scripts, potentially affecting high-privilege users such as administrators. When successfully exploited, the vulnerability could lead to the execution of malicious JavaScript code in the context of the targeted user's browser session (WPScan).

Cv1hTD

The vulnerability has been patched in version 3.3.9.1 of the Watu Quiz plugin. Website administrators are strongly advised to update to this version or later to protect against potential XSS attacks (Wordfence Report).

eODNrw


wdxz7KlXzpe4

Sn+yiv

yRZyYq

BDHA/i

Eq6YVV

qBL0qL

3pJ7V5

yd/Ltz

LfWFUw

MefUT7

CVE-2025-12966HIGH8.8
  • all-in-one-video-gallery
1UzENPl75CjTDec 06, 2025
CVE-2025-13907MEDIUM6.4
  • css3-buttons
1UzENP1UzENPDec 06, 2025
CVE-2025-13899MEDIUM6.4
  • tr-timthumb
1UzENP1UzENPDec 06, 2025
CVE-2025-13898MEDIUM6.4
  • ultra-skype-button
1UzENP1UzENPDec 06, 2025
CVE-2025-13896MEDIUM6.4
  • social-feed-gallery-portfolio
1UzENP1UzENPDec 06, 2025

0Y8wfh

fX1rcP

Rkx7gz

lVlJIo

hg51QW

Rm1gZh

v5ktBc

"shq3dj"
htk05AkgqPHn
"hFkAdK"
3uy78sXKvT9s
"KLylDc"
hanb5o7KXyr8