Skip to main content

CVE-2023-0078: CWE-79 Cross-Site Scripting (XSS) in Unknown Resume Builder

Medium
VulnerabilityCVE-2023-0078cvecve-2023-0078cwe-79
Published: Mon Mar 06 2023 (03/06/2023, 13:34:01 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Resume Builder

Description

The Resume Builder WordPress plugin through 3.1.1 does not sanitize and escape some parameters related to Resume, which could allow users with a role as low as subscriber to perform Stored XSS attacks against higher privilege users

AI-Powered Analysis

AILast updated: 07/07/2025, 00:24:51 UTC

Technical Analysis

CVE-2023-0078 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) found in the Resume Builder WordPress plugin up to version 3.1.1. The vulnerability arises because the plugin fails to properly sanitize and escape certain parameters related to resume data. This flaw allows users with minimal privileges—specifically, those assigned the subscriber role—to inject malicious scripts that are stored persistently within the application. When higher-privileged users, such as administrators or editors, view the affected resume data, the malicious scripts execute in their browsers. This stored XSS can lead to session hijacking, privilege escalation, or unauthorized actions performed on behalf of the victim user. The CVSS 3.1 base score is 5.4, indicating a medium impact, with an attack vector of network, low attack complexity, requiring low privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Confidentiality and integrity impacts are low, while availability is not affected. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided in the source data. The vulnerability was published on March 6, 2023, and assigned by WPScan and enriched by CISA. The plugin's unknown vendor and product name suggest it may be a less widely known or niche WordPress plugin, but its presence in WordPress ecosystems means it could be installed on many sites, especially those offering resume-building features.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the presence of the Resume Builder plugin on their WordPress sites. Organizations using this plugin to allow users or customers to create and manage resumes could be at risk of stored XSS attacks. Such attacks could lead to compromise of administrative accounts, unauthorized data access, or manipulation of website content. This is particularly concerning for HR departments, recruitment agencies, educational institutions, and job boards that rely on WordPress-based resume management. Exploitation could result in data leakage, reputational damage, and potential regulatory consequences under GDPR if personal data is exposed or manipulated. Since the attack requires a low-privilege user to inject scripts and a higher-privilege user to trigger them, internal threat actors or compromised subscriber accounts pose a significant risk. The lack of known exploits reduces immediate urgency but does not eliminate risk, as attackers may develop exploits in the future. The medium severity rating suggests that while the vulnerability is not critical, it should be addressed promptly to prevent escalation.

Mitigation Recommendations

1. Immediate mitigation involves auditing WordPress sites for the presence of the Resume Builder plugin and identifying versions up to 3.1.1. 2. If an updated patched version is released, promptly apply the update. In the absence of an official patch, consider temporarily disabling or uninstalling the plugin to eliminate exposure. 3. Implement strict role and permission management to limit subscriber capabilities and monitor for suspicious activity from low-privilege accounts. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting resume-related parameters. 5. Conduct code reviews or use security plugins that sanitize and escape user inputs to prevent injection of malicious scripts. 6. Educate administrators and users about the risks of clicking on suspicious links or content within the admin interface. 7. Monitor logs for unusual behavior indicative of attempted exploitation. 8. Consider deploying Content Security Policy (CSP) headers to restrict script execution sources, mitigating impact if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-01-05T08:01:01.093Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc3c9

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 12:24:51 AM

Last updated: 8/14/2025, 5:57:54 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats