
Cloud Vulnerability DB
A community-led vulnerabilities database
The Web Push Notifications WordPress plugin before version 4.35.0 contains a stored Cross-Site Scripting (XSS) vulnerability. The vulnerability was discovered on November 6, 2023, and was assigned CVE-2023-5620. The plugin fails to prevent unauthenticated visitors from modifying certain plugin options, which can be exploited to conduct stored XSS attacks (WPScan).
The vulnerability is classified as a Cross-Site Scripting (XSS) issue with CWE-79 (Improper Neutralization of Input During Web Page Generation). The vulnerability has a CVSS v3.1 base score of 5.4 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N. The issue specifically affects the plugin's price drop notification settings functionality, where unauthenticated users can inject malicious code that gets stored and executed when administrators view the settings page (WPScan).
When exploited, this vulnerability allows attackers to inject and store malicious JavaScript code that executes when administrators access the plugin's configuration page. This can lead to various security issues including potential theft of sensitive information or unauthorized actions performed under the administrator's context (WPScan).
Users are advised to update their Web Push Notifications WordPress plugin to version 4.35.0 or later, which contains the fix for this vulnerability (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."