4.8

CVE-2023-3650

Exploit

Bubble Menu <= 3.0.4 - Authenticated (Admin+) Stored Cross-Site Scripting

The Bubble Menu WordPress plugin before 3.0.5 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).
Mögliche Gegenmaßnahme
Bubble Menu – Floating Button Menu with Sticky Navigation: Update to version 3.0.5, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Bubble Menu – Floating Button Menu with Sticky Navigation
Version [*, 3.0.5)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wow-companyBubble Menu SwEditionfree SwPlatformwordpress Version < 3.0.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.3% 0.791
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.8 1.7 2.7
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N