Skip to main content

CVE-2023-0422: CWE-79 Cross-Site Scripting (XSS) in Unknown Article Directory

Medium
VulnerabilityCVE-2023-0422cvecve-2023-0422cwe-79
Published: Mon Apr 10 2023 (04/10/2023, 13:18:01 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Article Directory

Description

The Article Directory WordPress plugin through 1.3 does not properly sanitize the `publish_terms_text` setting before displaying it in the administration panel, which may enable administrators to conduct Stored XSS attacks in multisite contexts.

AI-Powered Analysis

AILast updated: 07/07/2025, 00:25:20 UTC

Technical Analysis

CVE-2023-0422 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the Article Directory WordPress plugin up to version 1.3. The vulnerability arises because the plugin does not properly sanitize the 'publish_terms_text' setting before rendering it in the WordPress administration panel. This flaw allows an attacker with administrator privileges in a multisite WordPress environment to inject and store malicious JavaScript code. When the malicious script is executed in the context of the administration panel, it can lead to stored XSS attacks. Stored XSS can be particularly dangerous as the malicious payload is saved on the server and executed every time the affected page is viewed by an administrator. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack requires administrator privileges (PR:H) and user interaction (UI:R), but can be executed remotely (AV:N) with low attack complexity (AC:L). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. No known exploits are currently reported in the wild, and no patches are linked, indicating that mitigation may require manual intervention or plugin updates once available. This vulnerability is specific to multisite WordPress installations using the Article Directory plugin, which is less common than single-site setups but still relevant for organizations managing multiple WordPress sites under one installation.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to those operating multisite WordPress environments with the Article Directory plugin installed. Successful exploitation could allow an attacker with administrator access to execute arbitrary JavaScript in the admin panel, potentially leading to session hijacking, unauthorized actions, or theft of sensitive administrative data. While the vulnerability requires administrator privileges, which limits the attack surface, insider threats or compromised admin accounts could be leveraged. The impact on confidentiality and integrity could affect data protection compliance under GDPR if sensitive data is exposed or manipulated. Additionally, organizations relying on WordPress multisite for managing multiple websites, such as media companies, educational institutions, or government agencies, could face operational disruptions or reputational damage if administrative control is undermined. However, since availability is not affected and exploitation requires user interaction, the overall operational risk is moderate but should not be ignored.

Mitigation Recommendations

European organizations should immediately audit their WordPress multisite installations to identify the presence of the Article Directory plugin, especially versions up to 1.3. Until an official patch is released, administrators should restrict access to the multisite admin panel to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. It is advisable to sanitize or avoid using the 'publish_terms_text' setting if possible, or to remove the plugin temporarily if it is not essential. Monitoring administrative activity logs for unusual behavior can help detect exploitation attempts. Organizations should subscribe to WPScan or other vulnerability databases for updates and apply patches promptly once available. Additionally, implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources in the admin panel. Regular security training for administrators on phishing and social engineering risks is also recommended to prevent credential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-01-20T08:51:21.017Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc427

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 12:25:20 AM

Last updated: 7/30/2025, 4:46:29 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats