Skip to main content

CVE-2023-2362: CWE-79 Cross-Site Scripting (XSS) in Unknown Float menu

Medium
VulnerabilityCVE-2023-2362cvecve-2023-2362cwe-79
Published: Mon Jun 12 2023 (06/12/2023, 17:28:22 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Float menu

Description

The Float menu WordPress plugin before 5.0.2, Bubble Menu WordPress plugin before 3.0.4, Button Generator WordPress plugin before 2.3.5, Calculator Builder WordPress plugin before 1.5.1, Counter Box WordPress plugin before 1.2.2, Floating Button WordPress plugin before 5.3.1, Herd Effects WordPress plugin before 5.2.2, Popup Box WordPress plugin before 2.2.2, Side Menu Lite WordPress plugin before 4.0.2, Sticky Buttons WordPress plugin before 3.1.1, Wow Skype Buttons WordPress plugin before 4.0.2, WP Coder WordPress plugin before 2.5.6 do not escape the page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

AI-Powered Analysis

AILast updated: 07/07/2025, 00:40:07 UTC

Technical Analysis

CVE-2023-2362 is a reflected Cross-Site Scripting (XSS) vulnerability affecting multiple WordPress plugins including Float menu (before 5.0.2), Bubble Menu (before 3.0.4), Button Generator (before 2.3.5), Calculator Builder (before 1.5.1), Counter Box (before 1.2.2), Floating Button (before 5.3.1), Herd Effects (before 5.2.2), Popup Box (before 2.2.2), Side Menu Lite (before 4.0.2), Sticky Buttons (before 3.1.1), Wow Skype Buttons (before 4.0.2), and WP Coder (before 2.5.6). The vulnerability arises because these plugins fail to properly escape the 'page' parameter before reflecting it back in an HTML attribute context. This improper sanitization allows an attacker to inject malicious JavaScript code that executes in the context of the victim's browser when they visit a crafted URL. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input leading to XSS. The attack vector is network-based (remote), requires no privileges (PR:N), but does require user interaction (UI:R), such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact includes limited confidentiality and integrity loss but no availability impact. Specifically, an attacker can execute arbitrary scripts in the context of high-privilege users such as WordPress administrators, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress admin interface. Although no known exploits are currently reported in the wild, the medium CVSS score of 6.1 reflects the moderate risk posed by this vulnerability due to its ease of exploitation and potential impact on administrative accounts. The lack of official patches at the time of reporting increases the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those relying on WordPress websites with any of the affected plugins installed. Successful exploitation could allow attackers to hijack administrator sessions, modify website content, inject malicious payloads, or pivot to further internal attacks. This can lead to reputational damage, data breaches involving customer or employee data, and potential regulatory non-compliance under GDPR if personal data is compromised. Since WordPress is widely used across Europe for corporate, governmental, and e-commerce websites, the attack surface is substantial. The reflected XSS nature means phishing or social engineering can be leveraged to trick privileged users into clicking malicious links, making it a practical threat vector. Additionally, compromised admin accounts could be used to deploy malware, deface websites, or disrupt services, impacting business continuity and trust. The medium severity suggests that while the vulnerability is not critical, it still warrants prompt attention to prevent exploitation and associated damages.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of any affected plugins and verify their versions. Until official patches are released, temporary mitigations include disabling or removing vulnerable plugins, or restricting access to the WordPress admin interface via IP whitelisting or VPN to limit exposure. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests containing malicious payloads targeting the 'page' parameter can reduce risk. Educating administrators and privileged users about the risks of clicking untrusted links and encouraging the use of multi-factor authentication (MFA) can mitigate session hijacking risks. Monitoring web server logs for unusual request patterns and anomalous user behavior can help detect attempted exploitation. Once patches become available, organizations should prioritize timely updates. Additionally, employing Content Security Policy (CSP) headers can help limit the impact of XSS by restricting script execution sources. Regular security assessments and plugin inventory management are recommended to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-04-28T10:05:48.876Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc58f

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 12:40:07 AM

Last updated: 7/30/2025, 8:00:49 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats