Skip to main content

CVE-2023-0544: CWE-79 Cross-Site Scripting (XSS) in Unknown WP Login Box

Medium
VulnerabilityCVE-2023-0544cvecve-2023-0544cwe-79
Published: Mon May 08 2023 (05/08/2023, 13:58:06 UTC)
Source: CVE
Vendor/Project: Unknown
Product: WP Login Box

Description

The WP Login Box WordPress plugin through 2.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/07/2025, 00:25:44 UTC

Technical Analysis

CVE-2023-0544 is a medium severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the WordPress plugin 'WP Login Box' up to version 2.0.2. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing stored XSS attacks. Specifically, high privilege users such as administrators can inject malicious scripts into plugin settings that are then stored and rendered in the WordPress admin interface or potentially other users' browsers. This can occur even when the 'unfiltered_html' capability is disabled, such as in multisite WordPress setups, which normally restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8 (medium), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L, I:L), with no impact on availability (A:N). The vulnerability is exploitable remotely by authenticated users with high privileges, requiring user interaction to trigger the malicious payload. No public exploits are known at this time, and no patches have been linked yet. The vulnerability could allow an attacker to execute arbitrary JavaScript in the context of the WordPress admin interface, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress site.

Potential Impact

For European organizations using WordPress with the WP Login Box plugin, this vulnerability poses a moderate risk. Since exploitation requires high privilege accounts, the threat is primarily from insider threats or compromised administrator accounts. Successful exploitation could lead to theft of administrator session tokens, unauthorized actions within the WordPress backend, or pivoting to further attacks on the hosting environment. This can impact confidentiality and integrity of website content and administrative controls. Organizations operating multisite WordPress installations are particularly at risk because the vulnerability bypasses the usual 'unfiltered_html' restrictions. Given the widespread use of WordPress in Europe across government, education, and commercial sectors, exploitation could disrupt website management and damage organizational reputation. However, the lack of known public exploits and the requirement for authenticated high privilege users reduce the immediacy of the threat.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the WP Login Box plugin and its version. If the plugin is installed, restrict administrator access to trusted personnel only and monitor for unusual administrative activity. Since no official patch is currently linked, organizations should consider temporarily disabling or uninstalling the plugin until a secure version is released. Implement Content Security Policy (CSP) headers to mitigate the impact of potential XSS payloads. Additionally, enforce strong authentication mechanisms such as MFA for all administrator accounts to reduce the risk of account compromise. Regularly review and sanitize all plugin settings and inputs, and consider using security plugins that detect and block XSS attempts. Stay updated with vendor advisories for patches or updates addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-01-27T12:24:47.741Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc43e

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 12:25:44 AM

Last updated: 8/6/2025, 6:35:46 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats