Skip to main content

CVE-2023-5956: CWE-79 Cross-Site Scripting (XSS) in Unknown Wp-Adv-Quiz

Medium
VulnerabilityCVE-2023-5956cvecve-2023-5956cwe-79
Published: Mon Jan 29 2024 (01/29/2024, 14:44:20 UTC)
Source: CVE Database V5
Vendor/Project: Unknown
Product: Wp-Adv-Quiz

Description

The Wp-Adv-Quiz WordPress plugin through 1.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

AI-Powered Analysis

AILast updated: 07/11/2025, 00:03:33 UTC

Technical Analysis

CVE-2023-5956 is a medium severity stored Cross-Site Scripting (XSS) vulnerability affecting the WordPress plugin Wp-Adv-Quiz up to version 1.0.2. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite environments, which typically restricts the ability to post unfiltered HTML content. The attack vector requires network access (remote), low attack complexity, and high privileges, with user interaction needed to trigger the malicious payload. The vulnerability impacts confidentiality and integrity by enabling script injection that could lead to session hijacking, privilege escalation, or unauthorized actions performed in the context of an admin user. However, it does not affect availability. No known public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may require manual intervention or plugin updates once available. The CVSS 3.1 base score is 4.8, reflecting a medium severity rating. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.

Potential Impact

For European organizations using WordPress sites with the Wp-Adv-Quiz plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of their web applications. An attacker with admin-level access could inject malicious scripts that execute in the browsers of other administrators or privileged users, potentially leading to credential theft, session hijacking, or unauthorized administrative actions. This could result in data breaches, defacement, or further compromise of internal systems. In multisite WordPress deployments common in larger organizations or managed service providers, the risk is heightened because the usual safeguard of disabling 'unfiltered_html' does not prevent exploitation. Given the widespread use of WordPress across European businesses, educational institutions, and government websites, exploitation could disrupt trust and lead to regulatory consequences under GDPR if personal data is exposed. However, the requirement for high privileges to exploit limits the threat to insiders or attackers who have already compromised an admin account, reducing the likelihood of external exploitation without prior access.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the Wp-Adv-Quiz plugin and its version. Until an official patch is released, administrators should consider disabling or uninstalling the plugin if it is not essential. For sites requiring the plugin, restrict admin access strictly and monitor for unusual administrative activity. Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting plugin settings. Additionally, enforce strong authentication mechanisms such as multi-factor authentication (MFA) for all admin users to reduce the risk of credential compromise. Regularly review and sanitize all user inputs and plugin settings manually if possible. Organizations should subscribe to vulnerability feeds and update the plugin promptly once a patch is available. Finally, conduct security awareness training for administrators about the risks of stored XSS and safe plugin management practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-11-03T17:29:54.390Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f5a1b0bd07c3938ab72

Added to database: 6/10/2025, 6:54:18 PM

Last enriched: 7/11/2025, 12:03:33 AM

Last updated: 8/5/2025, 6:29:46 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats