CVE-2023-2362: CWE-79 Cross-Site Scripting (XSS) in Unknown Float menu
The Float menu WordPress plugin before 5.0.2, Bubble Menu WordPress plugin before 3.0.4, Button Generator WordPress plugin before 2.3.5, Calculator Builder WordPress plugin before 1.5.1, Counter Box WordPress plugin before 1.2.2, Floating Button WordPress plugin before 5.3.1, Herd Effects WordPress plugin before 5.2.2, Popup Box WordPress plugin before 2.2.2, Side Menu Lite WordPress plugin before 4.0.2, Sticky Buttons WordPress plugin before 3.1.1, Wow Skype Buttons WordPress plugin before 4.0.2, WP Coder WordPress plugin before 2.5.6 do not escape the page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
AI Analysis
Technical Summary
CVE-2023-2362 is a reflected Cross-Site Scripting (XSS) vulnerability affecting multiple WordPress plugins including Float menu (before 5.0.2), Bubble Menu (before 3.0.4), Button Generator (before 2.3.5), Calculator Builder (before 1.5.1), Counter Box (before 1.2.2), Floating Button (before 5.3.1), Herd Effects (before 5.2.2), Popup Box (before 2.2.2), Side Menu Lite (before 4.0.2), Sticky Buttons (before 3.1.1), Wow Skype Buttons (before 4.0.2), and WP Coder (before 2.5.6). The vulnerability arises because these plugins fail to properly escape the 'page' parameter before reflecting it back in an HTML attribute context. This improper sanitization allows an attacker to inject malicious JavaScript code that executes in the context of the victim's browser when they visit a crafted URL. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input leading to XSS. The attack vector is network-based (remote), requires no privileges (PR:N), but does require user interaction (UI:R), such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. Specifically, an attacker can execute arbitrary scripts in the context of high-privilege users such as WordPress administrators, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress admin interface. Although no known exploits are currently reported in the wild, the medium CVSS score of 6.1 reflects the moderate risk posed by this vulnerability due to its ease of exploitation and potential impact on administrative accounts. The lack of official patches at the time of reporting increases the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those relying on WordPress websites with any of the affected plugins installed. Successful exploitation could allow attackers to hijack administrator sessions, modify website content, inject malicious payloads, or pivot to further internal attacks. This can lead to reputational damage, data breaches involving customer or employee data, and potential regulatory non-compliance under GDPR if personal data is compromised. Since WordPress is widely used across Europe for corporate, governmental, and e-commerce websites, the attack surface is substantial. The reflected XSS nature means phishing or social engineering can be leveraged to trick privileged users into clicking malicious links, making it a practical threat vector. Additionally, compromised admin accounts could be used to deploy malware, deface websites, or disrupt services, impacting business continuity and trust. The medium severity suggests that while the vulnerability is not critical, it still warrants prompt attention to prevent exploitation and associated damages.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of any affected plugins and verify their versions. Until official patches are released, temporary mitigations include disabling or removing vulnerable plugins, or restricting access to the WordPress admin interface via IP whitelisting or VPN to limit exposure. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests containing malicious payloads targeting the 'page' parameter can reduce risk. Educating administrators and privileged users about the risks of clicking untrusted links and encouraging the use of multi-factor authentication (MFA) can mitigate session hijacking risks. Monitoring web server logs for unusual request patterns and anomalous user behavior can help detect attempted exploitation. Once patches become available, organizations should prioritize timely updates. Additionally, employing Content Security Policy (CSP) headers can help limit the impact of XSS by restricting script execution sources. Regular security assessments and plugin inventory management are recommended to prevent similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2023-2362: CWE-79 Cross-Site Scripting (XSS) in Unknown Float menu
Description
The Float menu WordPress plugin before 5.0.2, Bubble Menu WordPress plugin before 3.0.4, Button Generator WordPress plugin before 2.3.5, Calculator Builder WordPress plugin before 1.5.1, Counter Box WordPress plugin before 1.2.2, Floating Button WordPress plugin before 5.3.1, Herd Effects WordPress plugin before 5.2.2, Popup Box WordPress plugin before 2.2.2, Side Menu Lite WordPress plugin before 4.0.2, Sticky Buttons WordPress plugin before 3.1.1, Wow Skype Buttons WordPress plugin before 4.0.2, WP Coder WordPress plugin before 2.5.6 do not escape the page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
AI-Powered Analysis
Technical Analysis
CVE-2023-2362 is a reflected Cross-Site Scripting (XSS) vulnerability affecting multiple WordPress plugins including Float menu (before 5.0.2), Bubble Menu (before 3.0.4), Button Generator (before 2.3.5), Calculator Builder (before 1.5.1), Counter Box (before 1.2.2), Floating Button (before 5.3.1), Herd Effects (before 5.2.2), Popup Box (before 2.2.2), Side Menu Lite (before 4.0.2), Sticky Buttons (before 3.1.1), Wow Skype Buttons (before 4.0.2), and WP Coder (before 2.5.6). The vulnerability arises because these plugins fail to properly escape the 'page' parameter before reflecting it back in an HTML attribute context. This improper sanitization allows an attacker to inject malicious JavaScript code that executes in the context of the victim's browser when they visit a crafted URL. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input leading to XSS. The attack vector is network-based (remote), requires no privileges (PR:N), but does require user interaction (UI:R), such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. Specifically, an attacker can execute arbitrary scripts in the context of high-privilege users such as WordPress administrators, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress admin interface. Although no known exploits are currently reported in the wild, the medium CVSS score of 6.1 reflects the moderate risk posed by this vulnerability due to its ease of exploitation and potential impact on administrative accounts. The lack of official patches at the time of reporting increases the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those relying on WordPress websites with any of the affected plugins installed. Successful exploitation could allow attackers to hijack administrator sessions, modify website content, inject malicious payloads, or pivot to further internal attacks. This can lead to reputational damage, data breaches involving customer or employee data, and potential regulatory non-compliance under GDPR if personal data is compromised. Since WordPress is widely used across Europe for corporate, governmental, and e-commerce websites, the attack surface is substantial. The reflected XSS nature means phishing or social engineering can be leveraged to trick privileged users into clicking malicious links, making it a practical threat vector. Additionally, compromised admin accounts could be used to deploy malware, deface websites, or disrupt services, impacting business continuity and trust. The medium severity suggests that while the vulnerability is not critical, it still warrants prompt attention to prevent exploitation and associated damages.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of any affected plugins and verify their versions. Until official patches are released, temporary mitigations include disabling or removing vulnerable plugins, or restricting access to the WordPress admin interface via IP whitelisting or VPN to limit exposure. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests containing malicious payloads targeting the 'page' parameter can reduce risk. Educating administrators and privileged users about the risks of clicking untrusted links and encouraging the use of multi-factor authentication (MFA) can mitigate session hijacking risks. Monitoring web server logs for unusual request patterns and anomalous user behavior can help detect attempted exploitation. Once patches become available, organizations should prioritize timely updates. Additionally, employing Content Security Policy (CSP) headers can help limit the impact of XSS by restricting script execution sources. Regular security assessments and plugin inventory management are recommended to prevent similar vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-04-28T10:05:48.876Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdc58f
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/7/2025, 12:40:07 AM
Last updated: 7/30/2025, 8:00:49 PM
Views: 9
Related Threats
CVE-2025-8959: CWE-59: Improper Link Resolution Before File Access (Link Following) in HashiCorp Shared library
HighCVE-2025-44201
LowCVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumCVE-2025-9060: CWE-20 Improper Input Validation in MSoft MFlash
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.