CVE-2023-0078: CWE-79 Cross-Site Scripting (XSS) in Unknown Resume Builder
The Resume Builder WordPress plugin through 3.1.1 does not sanitize and escape some parameters related to Resume, which could allow users with a role as low as subscriber to perform Stored XSS attacks against higher privilege users
AI Analysis
Technical Summary
CVE-2023-0078 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) found in the Resume Builder WordPress plugin up to version 3.1.1. The vulnerability arises because the plugin fails to properly sanitize and escape certain parameters related to resume data. This flaw allows users with minimal privileges—specifically, those assigned the subscriber role—to inject malicious scripts that are stored persistently within the application. When higher-privileged users, such as administrators or editors, view the affected resume data, the malicious scripts execute in their browsers. This stored XSS can lead to session hijacking, privilege escalation, or unauthorized actions performed on behalf of the victim user. The CVSS 3.1 base score is 5.4, indicating a medium impact, with an attack vector of network, low attack complexity, requiring low privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Confidentiality and integrity impacts are low, while availability is not affected. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided in the source data. The vulnerability was published on March 6, 2023, and assigned by WPScan and enriched by CISA. The plugin's unknown vendor and product name suggest it may be a less widely known or niche WordPress plugin, but its presence in WordPress ecosystems means it could be installed on many sites, especially those offering resume-building features.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the presence of the Resume Builder plugin on their WordPress sites. Organizations using this plugin to allow users or customers to create and manage resumes could be at risk of stored XSS attacks. Such attacks could lead to compromise of administrative accounts, unauthorized data access, or manipulation of website content. This is particularly concerning for HR departments, recruitment agencies, educational institutions, and job boards that rely on WordPress-based resume management. Exploitation could result in data leakage, reputational damage, and potential regulatory consequences under GDPR if personal data is exposed or manipulated. Since the attack requires a low-privilege user to inject scripts and a higher-privilege user to trigger them, internal threat actors or compromised subscriber accounts pose a significant risk. The lack of known exploits reduces immediate urgency but does not eliminate risk, as attackers may develop exploits in the future. The medium severity rating suggests that while the vulnerability is not critical, it should be addressed promptly to prevent escalation.
Mitigation Recommendations
1. Immediate mitigation involves auditing WordPress sites for the presence of the Resume Builder plugin and identifying versions up to 3.1.1. 2. If an updated patched version is released, promptly apply the update. In the absence of an official patch, consider temporarily disabling or uninstalling the plugin to eliminate exposure. 3. Implement strict role and permission management to limit subscriber capabilities and monitor for suspicious activity from low-privilege accounts. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting resume-related parameters. 5. Conduct code reviews or use security plugins that sanitize and escape user inputs to prevent injection of malicious scripts. 6. Educate administrators and users about the risks of clicking on suspicious links or content within the admin interface. 7. Monitor logs for unusual behavior indicative of attempted exploitation. 8. Consider deploying Content Security Policy (CSP) headers to restrict script execution sources, mitigating impact if exploitation occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-0078: CWE-79 Cross-Site Scripting (XSS) in Unknown Resume Builder
Description
The Resume Builder WordPress plugin through 3.1.1 does not sanitize and escape some parameters related to Resume, which could allow users with a role as low as subscriber to perform Stored XSS attacks against higher privilege users
AI-Powered Analysis
Technical Analysis
CVE-2023-0078 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) found in the Resume Builder WordPress plugin up to version 3.1.1. The vulnerability arises because the plugin fails to properly sanitize and escape certain parameters related to resume data. This flaw allows users with minimal privileges—specifically, those assigned the subscriber role—to inject malicious scripts that are stored persistently within the application. When higher-privileged users, such as administrators or editors, view the affected resume data, the malicious scripts execute in their browsers. This stored XSS can lead to session hijacking, privilege escalation, or unauthorized actions performed on behalf of the victim user. The CVSS 3.1 base score is 5.4, indicating a medium impact, with an attack vector of network, low attack complexity, requiring low privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Confidentiality and integrity impacts are low, while availability is not affected. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided in the source data. The vulnerability was published on March 6, 2023, and assigned by WPScan and enriched by CISA. The plugin's unknown vendor and product name suggest it may be a less widely known or niche WordPress plugin, but its presence in WordPress ecosystems means it could be installed on many sites, especially those offering resume-building features.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the presence of the Resume Builder plugin on their WordPress sites. Organizations using this plugin to allow users or customers to create and manage resumes could be at risk of stored XSS attacks. Such attacks could lead to compromise of administrative accounts, unauthorized data access, or manipulation of website content. This is particularly concerning for HR departments, recruitment agencies, educational institutions, and job boards that rely on WordPress-based resume management. Exploitation could result in data leakage, reputational damage, and potential regulatory consequences under GDPR if personal data is exposed or manipulated. Since the attack requires a low-privilege user to inject scripts and a higher-privilege user to trigger them, internal threat actors or compromised subscriber accounts pose a significant risk. The lack of known exploits reduces immediate urgency but does not eliminate risk, as attackers may develop exploits in the future. The medium severity rating suggests that while the vulnerability is not critical, it should be addressed promptly to prevent escalation.
Mitigation Recommendations
1. Immediate mitigation involves auditing WordPress sites for the presence of the Resume Builder plugin and identifying versions up to 3.1.1. 2. If an updated patched version is released, promptly apply the update. In the absence of an official patch, consider temporarily disabling or uninstalling the plugin to eliminate exposure. 3. Implement strict role and permission management to limit subscriber capabilities and monitor for suspicious activity from low-privilege accounts. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting resume-related parameters. 5. Conduct code reviews or use security plugins that sanitize and escape user inputs to prevent injection of malicious scripts. 6. Educate administrators and users about the risks of clicking on suspicious links or content within the admin interface. 7. Monitor logs for unusual behavior indicative of attempted exploitation. 8. Consider deploying Content Security Policy (CSP) headers to restrict script execution sources, mitigating impact if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-01-05T08:01:01.093Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc3c9
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/7/2025, 12:24:51 AM
Last updated: 8/14/2025, 5:57:54 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.