Skip to main content

CVE-2023-4290: CWE-79 Cross-Site Scripting (XSS) in Unknown WP Matterport Shortcode

Medium
Published: Mon Oct 16 2023 (10/16/2023, 19:22:43 UTC)
Source: CVE
Vendor/Project: Unknown
Product: WP Matterport Shortcode

Description

The WP Matterport Shortcode WordPress plugin before 2.1.7 does not escape the PHP_SELF server variable when outputting it in attributes, leading to Reflected Cross-Site Scripting issues which could be used against high privilege users such as admin

AI-Powered Analysis

AILast updated: 06/22/2025, 09:51:33 UTC

Technical Analysis

CVE-2023-4290 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the WP Matterport Shortcode WordPress plugin, affecting versions prior to 2.1.7. This vulnerability arises because the plugin fails to properly escape the PHP_SELF server variable when outputting it within HTML attributes. PHP_SELF contains the filename of the currently executing script, and if not sanitized, it can be manipulated by an attacker to inject malicious JavaScript code. When a high-privilege user such as an administrator visits a crafted URL exploiting this flaw, the malicious script executes in their browser context. This can lead to session hijacking, privilege escalation, or unauthorized actions performed with the admin’s credentials. The vulnerability is classified under CWE-79, indicating improper neutralization of input leading to XSS. The CVSS v3.1 base score is 6.1 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is needed (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. Confidentiality and integrity impacts are low, and availability is not affected. No known exploits are currently reported in the wild, and no official patches or updates have been linked yet. The vulnerability was reserved in August 2023 and published in October 2023. Given the plugin’s nature as a WordPress shortcode for embedding Matterport 3D models, it is likely used by websites integrating Matterport content, which may include real estate, architecture, and tourism sectors.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to websites using the WP Matterport Shortcode plugin. If exploited, attackers could execute arbitrary scripts in the context of high-privilege users, potentially leading to unauthorized administrative actions, data leakage, or site defacement. This can undermine trust, cause reputational damage, and in regulated sectors, lead to compliance issues under GDPR due to unauthorized access or data exposure. Organizations in real estate, cultural heritage, tourism, and architecture sectors that rely on Matterport 3D visualizations are particularly at risk. The reflected nature of the XSS means attackers must lure administrators to click on malicious links, so phishing campaigns could be a vector. While the vulnerability does not directly compromise server availability or integrity at a system level, the ability to hijack admin sessions or manipulate site content can have significant operational impacts. Additionally, the changed scope indicates that the vulnerability could affect other components or data beyond the plugin itself, increasing potential damage. The absence of known exploits suggests limited active targeting so far, but the medium CVSS score and ease of exploitation (no privileges needed) warrant proactive mitigation.

Mitigation Recommendations

1. Immediate action should be to update the WP Matterport Shortcode plugin to version 2.1.7 or later once available, as this will likely include the necessary input sanitization and escaping fixes. 2. Until an official patch is released, implement Web Application Firewall (WAF) rules to detect and block suspicious requests containing malicious payloads targeting PHP_SELF or unusual URL parameters. 3. Educate administrators and high-privilege users to avoid clicking on untrusted or suspicious links that could trigger reflected XSS attacks. 4. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS vulnerabilities. 5. Conduct regular security audits and vulnerability scans focusing on WordPress plugins, especially those handling user input or embedding third-party content. 6. Monitor web server logs for unusual request patterns that may indicate attempted exploitation. 7. Consider disabling or removing the WP Matterport Shortcode plugin if it is not essential to reduce attack surface. 8. Implement multi-factor authentication (MFA) for WordPress admin accounts to mitigate the risk of session hijacking consequences. These steps go beyond generic advice by focusing on interim protective controls and user awareness until patches are applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-08-10T11:54:26.267Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf5247

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/22/2025, 9:51:33 AM

Last updated: 7/26/2025, 11:28:08 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats