4.4
CVE-2023-6494
- EPSS 0.1%
- Veröffentlicht 13.04.2024 09:15:06
- Zuletzt bearbeitet 17.06.2025 20:58:23
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
WPC Smart Quick View for WooCommerce <= 4.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting
The WPC Smart Quick View for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Mögliche Gegenmaßnahme
WPC Smart Quick View for WooCommerce: Update to version 4.0.3, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WPC Smart Quick View for WooCommerce
Version
* - 4.0.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wpclever ≫ Wpc Smart Quick View For Woocommerce SwPlatformwordpress Version < 4.0.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.1% | 0.285 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 4.4 | 1.3 | 2.7 |
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.