Rewterz Threat Advisory – ICS: Schneider Electric IGSS Dashboard Vulnerability
June 20, 2023Rewterz Threat Alert – JokerSpy Backdoors and Spyware Target Apple macOS Systems – Active IOCs
June 20, 2023Rewterz Threat Advisory – ICS: Schneider Electric IGSS Dashboard Vulnerability
June 20, 2023Rewterz Threat Alert – JokerSpy Backdoors and Spyware Target Apple macOS Systems – Active IOCs
June 20, 2023Severity
Medium
Analysis Summary
CVE-2023-26527 CVSS:5.9
Debug Assistant Plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2023-26515 CVSS:5.9
Simple Slug Translate plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2023-25963 CVSS:5.9
JS Job Manager Plugin for WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2023-25449 CVSS:4.3
CformsII Plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to perform unauthorized actions. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2023-25450 CVSS:5.4
GiveWP Plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to perform unauthorized actions. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2023-23802 CVSS:4.3
HT Easy GA4plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to perform unauthorized actions. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
Impact
- Cross-Site Scripting
Indicators Of Compromise
CVE
- CVE-2023-26527
- CVE-2023-26515
- CVE-2023-25963
- CVE-2023-25449
- CVE-2023-25450
- CVE-2023-23802
Affected Vendors
WordPress
Affected Products
- WordPress Debug Assistant Plugin for WordPress 1.4
- WordPress Simple Slug Translate Plugin for WordPress 2.7.2
- WordPress GiveWP Plugin for WordPress 2.25.1
- WordPress CformsII Plugin for WordPress 15.0.4
- WordPress HT Easy GA4 Plugin for WordPress 1.0.6
Remediation
Upgrade to the latest version of wordpress plugins, available from the WordPress Plugin Directory.