CVE-2023-0544: CWE-79 Cross-Site Scripting (XSS) in Unknown WP Login Box
The WP Login Box WordPress plugin through 2.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI Analysis
Technical Summary
CVE-2023-0544 is a medium severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the WordPress plugin 'WP Login Box' up to version 2.0.2. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing stored XSS attacks. Specifically, high privilege users such as administrators can inject malicious scripts into plugin settings that are then stored and rendered in the WordPress admin interface or potentially other users' browsers. This can occur even when the 'unfiltered_html' capability is disabled, such as in multisite WordPress setups, which normally restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8 (medium), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L, I:L), with no impact on availability (A:N). The vulnerability is exploitable remotely by authenticated users with high privileges, requiring user interaction to trigger the malicious payload. No public exploits are known at this time, and no patches have been linked yet. The vulnerability could allow an attacker to execute arbitrary JavaScript in the context of the WordPress admin interface, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress site.
Potential Impact
For European organizations using WordPress with the WP Login Box plugin, this vulnerability poses a moderate risk. Since exploitation requires high privilege accounts, the threat is primarily from insider threats or compromised administrator accounts. Successful exploitation could lead to theft of administrator session tokens, unauthorized actions within the WordPress backend, or pivoting to further attacks on the hosting environment. This can impact confidentiality and integrity of website content and administrative controls. Organizations operating multisite WordPress installations are particularly at risk because the vulnerability bypasses the usual 'unfiltered_html' restrictions. Given the widespread use of WordPress in Europe across government, education, and commercial sectors, exploitation could disrupt website management and damage organizational reputation. However, the lack of known public exploits and the requirement for authenticated high privilege users reduce the immediacy of the threat.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the WP Login Box plugin and its version. If the plugin is installed, restrict administrator access to trusted personnel only and monitor for unusual administrative activity. Since no official patch is currently linked, organizations should consider temporarily disabling or uninstalling the plugin until a secure version is released. Implement Content Security Policy (CSP) headers to mitigate the impact of potential XSS payloads. Additionally, enforce strong authentication mechanisms such as MFA for all administrator accounts to reduce the risk of account compromise. Regularly review and sanitize all plugin settings and inputs, and consider using security plugins that detect and block XSS attempts. Stay updated with vendor advisories for patches or updates addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-0544: CWE-79 Cross-Site Scripting (XSS) in Unknown WP Login Box
Description
The WP Login Box WordPress plugin through 2.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI-Powered Analysis
Technical Analysis
CVE-2023-0544 is a medium severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the WordPress plugin 'WP Login Box' up to version 2.0.2. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings, allowing stored XSS attacks. Specifically, high privilege users such as administrators can inject malicious scripts into plugin settings that are then stored and rendered in the WordPress admin interface or potentially other users' browsers. This can occur even when the 'unfiltered_html' capability is disabled, such as in multisite WordPress setups, which normally restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 4.8 (medium), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L, I:L), with no impact on availability (A:N). The vulnerability is exploitable remotely by authenticated users with high privileges, requiring user interaction to trigger the malicious payload. No public exploits are known at this time, and no patches have been linked yet. The vulnerability could allow an attacker to execute arbitrary JavaScript in the context of the WordPress admin interface, potentially leading to session hijacking, privilege escalation, or further compromise of the WordPress site.
Potential Impact
For European organizations using WordPress with the WP Login Box plugin, this vulnerability poses a moderate risk. Since exploitation requires high privilege accounts, the threat is primarily from insider threats or compromised administrator accounts. Successful exploitation could lead to theft of administrator session tokens, unauthorized actions within the WordPress backend, or pivoting to further attacks on the hosting environment. This can impact confidentiality and integrity of website content and administrative controls. Organizations operating multisite WordPress installations are particularly at risk because the vulnerability bypasses the usual 'unfiltered_html' restrictions. Given the widespread use of WordPress in Europe across government, education, and commercial sectors, exploitation could disrupt website management and damage organizational reputation. However, the lack of known public exploits and the requirement for authenticated high privilege users reduce the immediacy of the threat.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the WP Login Box plugin and its version. If the plugin is installed, restrict administrator access to trusted personnel only and monitor for unusual administrative activity. Since no official patch is currently linked, organizations should consider temporarily disabling or uninstalling the plugin until a secure version is released. Implement Content Security Policy (CSP) headers to mitigate the impact of potential XSS payloads. Additionally, enforce strong authentication mechanisms such as MFA for all administrator accounts to reduce the risk of account compromise. Regularly review and sanitize all plugin settings and inputs, and consider using security plugins that detect and block XSS attempts. Stay updated with vendor advisories for patches or updates addressing this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-01-27T12:24:47.741Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc43e
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/7/2025, 12:25:44 AM
Last updated: 8/6/2025, 6:35:46 PM
Views: 16
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.