
Cloud Vulnerability DB
A community-led vulnerabilities database
The Simple Membership plugin for WordPress contains a Reflected Cross-Site Scripting vulnerability (CVE-2023-4719) in versions up to 4.3.5. The vulnerability was discovered in the list_type parameter due to insufficient input sanitization and output escaping (NVD).
The vulnerability allows unauthenticated attackers to inject arbitrary web scripts into pages that will be executed if they can successfully trick a user into taking an action, such as clicking a malicious link. The CVSS v3.1 base score is 6.1 (Medium) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N according to NVD, while Wordfence rates it as 7.2 (High) (NVD).
If successfully exploited, an attacker could inject malicious web scripts that would execute in users' browsers when they visit affected pages. This could potentially lead to theft of sensitive information or manipulation of page content for users who are tricked into triggering the malicious script (NVD).
Users should update to Simple Membership plugin version 4.3.6 or later which contains fixes for this vulnerability (WordPress Plugin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."