
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-36259 is a Cross-Site Scripting (XSS) vulnerability discovered in the Craft CMS Audit Plugin affecting versions before 3.0.2. The vulnerability was disclosed on January 30, 2024, and affects the user creation functionality within the plugin (NVD, CVE).
The vulnerability is classified as a Cross-Site Scripting (XSS) issue with a CVSS v3.1 base score of 5.4 (Medium) and vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. The vulnerability stems from insufficient input validation within the Audit Plugin, allowing malicious actors to inject JavaScript code during the user creation phase (NVD, AMR CyberSecurity).
When exploited, the vulnerability allows attackers to execute arbitrary code when users access the 'audit' tab, potentially leading to unauthorized access and data breaches. The execution of injected code occurs during user creation processes (AMR CyberSecurity).
The vulnerability has been patched in version 3.0.2 of the Audit Plugin. Users are strongly recommended to update to this version or later to mitigate the security risk (AMR CyberSecurity).
Security researchers and developers have noted that while the vulnerability is significant, its impact is limited by the fact that it requires authenticated access to exploit. The Craft CMS community responded promptly by releasing a patch to address the security concern (Github PR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."