Skip to main content

CVE-2023-4390: CWE-79 Cross-Site Scripting (XSS) in Unknown Popup box

Medium
Published: Tue Oct 31 2023 (10/31/2023, 13:54:45 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Popup box

Description

The Popup box WordPress plugin before 3.7.2 does not sanitize and escape some Popup fields, which could allow high-privilege users such as an administrator to inject arbitrary web scripts even when the unfiltered_html capability is disallowed (for example in a multisite setup).

AI-Powered Analysis

AILast updated: 06/22/2025, 09:50:31 UTC

Technical Analysis

CVE-2023-4390 is a medium-severity Cross-Site Scripting (XSS) vulnerability affecting the Popup box WordPress plugin versions prior to 3.7.2. The vulnerability arises because certain fields within the Popup box plugin do not properly sanitize or escape user-supplied input. This flaw allows high-privilege users, such as administrators, to inject arbitrary JavaScript code into the plugin's interface. Notably, this injection is possible even when the WordPress unfiltered_html capability is disabled, such as in multisite WordPress environments, which typically restrict script injection. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Exploitation requires a high-privilege user to interact with the vulnerable fields and inject malicious scripts, which then execute in the context of other users viewing the affected popup content. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based with low attack complexity, requires high privileges, and user interaction is needed. The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no official patches or vendor information beyond the version fix are provided in the data. The vulnerability is significant in environments where multiple administrators or privileged users manage popup content, as it could lead to session hijacking, privilege escalation, or unauthorized actions performed via injected scripts.

Potential Impact

For European organizations using WordPress sites with the Popup box plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of web sessions and data. In multisite WordPress setups common in larger enterprises, educational institutions, and government agencies, the ability for a high-privilege user to inject scripts despite restricted HTML capabilities could facilitate lateral movement or persistent cross-site scripting attacks. This could lead to theft of authentication tokens, unauthorized administrative actions, or defacement. While the vulnerability does not directly affect availability, the indirect consequences of compromised administrative accounts could disrupt website operations or lead to data breaches. Organizations with public-facing WordPress sites that rely on Popup box for marketing, notifications, or user interaction may see reputational damage if exploited. The medium severity suggests a moderate but non-trivial risk, especially in environments with multiple administrators or where administrative accounts are shared or less tightly controlled.

Mitigation Recommendations

1. Immediate upgrade to Popup box plugin version 3.7.2 or later where the vulnerability is fixed. 2. Restrict administrative privileges to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised high-privilege accounts. 3. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on WordPress sites, mitigating the impact of injected scripts. 4. Regularly audit and monitor administrative actions and popup content changes for suspicious activity or unexpected script insertions. 5. In multisite environments, review and tighten user role assignments and capabilities to minimize the number of users with high privileges. 6. Employ web application firewalls (WAF) with custom rules to detect and block suspicious script injection attempts targeting popup fields. 7. Educate administrators on safe content input practices and the risks of injecting untrusted code. 8. Conduct periodic vulnerability scans and penetration tests focusing on plugin security and XSS vectors to proactively identify similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-08-16T18:31:54.690Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf5289

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/22/2025, 9:50:31 AM

Last updated: 8/5/2025, 6:29:46 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats