CVE-2023-4390: CWE-79 Cross-Site Scripting (XSS) in Unknown Popup box
The Popup box WordPress plugin before 3.7.2 does not sanitize and escape some Popup fields, which could allow high-privilege users such as an administrator to inject arbitrary web scripts even when the unfiltered_html capability is disallowed (for example in a multisite setup).
AI Analysis
Technical Summary
CVE-2023-4390 is a medium-severity Cross-Site Scripting (XSS) vulnerability affecting the Popup box WordPress plugin versions prior to 3.7.2. The vulnerability arises because certain fields within the Popup box plugin do not properly sanitize or escape user-supplied input. This flaw allows high-privilege users, such as administrators, to inject arbitrary JavaScript code into the plugin's interface. Notably, this injection is possible even when the WordPress unfiltered_html capability is disabled, such as in multisite WordPress environments, which typically restrict script injection. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Exploitation requires a high-privilege user to interact with the vulnerable fields and inject malicious scripts, which then execute in the context of other users viewing the affected popup content. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based with low attack complexity, requires high privileges, and user interaction is needed. The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no official patches or vendor information beyond the version fix are provided in the data. The vulnerability is significant in environments where multiple administrators or privileged users manage popup content, as it could lead to session hijacking, privilege escalation, or unauthorized actions performed via injected scripts.
Potential Impact
For European organizations using WordPress sites with the Popup box plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of web sessions and data. In multisite WordPress setups common in larger enterprises, educational institutions, and government agencies, the ability for a high-privilege user to inject scripts despite restricted HTML capabilities could facilitate lateral movement or persistent cross-site scripting attacks. This could lead to theft of authentication tokens, unauthorized administrative actions, or defacement. While the vulnerability does not directly affect availability, the indirect consequences of compromised administrative accounts could disrupt website operations or lead to data breaches. Organizations with public-facing WordPress sites that rely on Popup box for marketing, notifications, or user interaction may see reputational damage if exploited. The medium severity suggests a moderate but non-trivial risk, especially in environments with multiple administrators or where administrative accounts are shared or less tightly controlled.
Mitigation Recommendations
1. Immediate upgrade to Popup box plugin version 3.7.2 or later where the vulnerability is fixed. 2. Restrict administrative privileges to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised high-privilege accounts. 3. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on WordPress sites, mitigating the impact of injected scripts. 4. Regularly audit and monitor administrative actions and popup content changes for suspicious activity or unexpected script insertions. 5. In multisite environments, review and tighten user role assignments and capabilities to minimize the number of users with high privileges. 6. Employ web application firewalls (WAF) with custom rules to detect and block suspicious script injection attempts targeting popup fields. 7. Educate administrators on safe content input practices and the risks of injecting untrusted code. 8. Conduct periodic vulnerability scans and penetration tests focusing on plugin security and XSS vectors to proactively identify similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2023-4390: CWE-79 Cross-Site Scripting (XSS) in Unknown Popup box
Description
The Popup box WordPress plugin before 3.7.2 does not sanitize and escape some Popup fields, which could allow high-privilege users such as an administrator to inject arbitrary web scripts even when the unfiltered_html capability is disallowed (for example in a multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2023-4390 is a medium-severity Cross-Site Scripting (XSS) vulnerability affecting the Popup box WordPress plugin versions prior to 3.7.2. The vulnerability arises because certain fields within the Popup box plugin do not properly sanitize or escape user-supplied input. This flaw allows high-privilege users, such as administrators, to inject arbitrary JavaScript code into the plugin's interface. Notably, this injection is possible even when the WordPress unfiltered_html capability is disabled, such as in multisite WordPress environments, which typically restrict script injection. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Exploitation requires a high-privilege user to interact with the vulnerable fields and inject malicious scripts, which then execute in the context of other users viewing the affected popup content. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack vector is network-based with low attack complexity, requires high privileges, and user interaction is needed. The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no official patches or vendor information beyond the version fix are provided in the data. The vulnerability is significant in environments where multiple administrators or privileged users manage popup content, as it could lead to session hijacking, privilege escalation, or unauthorized actions performed via injected scripts.
Potential Impact
For European organizations using WordPress sites with the Popup box plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of web sessions and data. In multisite WordPress setups common in larger enterprises, educational institutions, and government agencies, the ability for a high-privilege user to inject scripts despite restricted HTML capabilities could facilitate lateral movement or persistent cross-site scripting attacks. This could lead to theft of authentication tokens, unauthorized administrative actions, or defacement. While the vulnerability does not directly affect availability, the indirect consequences of compromised administrative accounts could disrupt website operations or lead to data breaches. Organizations with public-facing WordPress sites that rely on Popup box for marketing, notifications, or user interaction may see reputational damage if exploited. The medium severity suggests a moderate but non-trivial risk, especially in environments with multiple administrators or where administrative accounts are shared or less tightly controlled.
Mitigation Recommendations
1. Immediate upgrade to Popup box plugin version 3.7.2 or later where the vulnerability is fixed. 2. Restrict administrative privileges to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised high-privilege accounts. 3. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on WordPress sites, mitigating the impact of injected scripts. 4. Regularly audit and monitor administrative actions and popup content changes for suspicious activity or unexpected script insertions. 5. In multisite environments, review and tighten user role assignments and capabilities to minimize the number of users with high privileges. 6. Employ web application firewalls (WAF) with custom rules to detect and block suspicious script injection attempts targeting popup fields. 7. Educate administrators on safe content input practices and the risks of injecting untrusted code. 8. Conduct periodic vulnerability scans and penetration tests focusing on plugin security and XSS vectors to proactively identify similar issues.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-08-16T18:31:54.690Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf5289
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 9:50:31 AM
Last updated: 8/5/2025, 6:29:46 AM
Views: 15
Related Threats
CVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowCVE-2025-6679: CWE-434 Unrestricted Upload of File with Dangerous Type in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder
CriticalCVE-2025-9013: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.