CVE-2023-6081: CWE-79 Cross-Site Scripting (XSS) in Unknown chartjs
The chartjs WordPress plugin through 2023.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2023-6081 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability identified in the chartjs WordPress plugin version 2023.2. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings before rendering them in the WordPress admin interface or potentially on the front end. This flaw allows users with high privileges, such as administrators, to inject malicious JavaScript code that is stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which normally restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based (remote), requires low attack complexity, but does require privileges at the level of a logged-in user with elevated rights (PR:L). User interaction is required to trigger the malicious script, and the scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss, as the attacker can execute arbitrary JavaScript in the context of the affected site, potentially leading to session hijacking, privilege escalation, or other malicious actions within the admin interface. There is no indication of known exploits in the wild yet, and no official patches have been linked at the time of this report. The vulnerability is classified under CWE-79, which is a common and well-understood XSS category.
Potential Impact
For European organizations using WordPress sites with the chartjs plugin version 2023.2, this vulnerability poses a moderate risk. Since exploitation requires high privilege user access, the threat is primarily from insider threats or compromised admin accounts. Successful exploitation could allow attackers to execute arbitrary scripts within the administrative context, potentially leading to unauthorized changes, data leakage, or pivoting to other parts of the network. In regulated industries common in Europe, such as finance, healthcare, and government, such an attack could lead to compliance violations (e.g., GDPR breaches) and reputational damage. Multisite WordPress setups, often used by large organizations and educational institutions, are particularly at risk because the usual unfiltered_html restriction does not mitigate this vulnerability. The lack of known exploits reduces immediate risk but should not lead to complacency given the ease of exploitation once an attacker has admin privileges.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the chartjs plugin version 2023.2. Until an official patch is released, organizations should restrict administrative access strictly to trusted users and enforce strong authentication mechanisms such as multi-factor authentication (MFA). Regularly review and monitor admin user activities for suspicious behavior. Consider disabling or removing the chartjs plugin if it is not essential. Implement Content Security Policy (CSP) headers to reduce the impact of XSS attacks by restricting the execution of unauthorized scripts. Additionally, organizations should keep WordPress core and all plugins updated and subscribe to vulnerability feeds to apply patches promptly once available. For multisite environments, extra caution should be taken to monitor and restrict admin-level user capabilities. Employ web application firewalls (WAFs) that can detect and block XSS payloads as an additional layer of defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-6081: CWE-79 Cross-Site Scripting (XSS) in Unknown chartjs
Description
The chartjs WordPress plugin through 2023.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2023-6081 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability identified in the chartjs WordPress plugin version 2023.2. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings before rendering them in the WordPress admin interface or potentially on the front end. This flaw allows users with high privileges, such as administrators, to inject malicious JavaScript code that is stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which normally restricts the ability to post unfiltered HTML. The CVSS 3.1 base score is 5.4 (medium), reflecting that the attack vector is network-based (remote), requires low attack complexity, but does require privileges at the level of a logged-in user with elevated rights (PR:L). User interaction is required to trigger the malicious script, and the scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss, as the attacker can execute arbitrary JavaScript in the context of the affected site, potentially leading to session hijacking, privilege escalation, or other malicious actions within the admin interface. There is no indication of known exploits in the wild yet, and no official patches have been linked at the time of this report. The vulnerability is classified under CWE-79, which is a common and well-understood XSS category.
Potential Impact
For European organizations using WordPress sites with the chartjs plugin version 2023.2, this vulnerability poses a moderate risk. Since exploitation requires high privilege user access, the threat is primarily from insider threats or compromised admin accounts. Successful exploitation could allow attackers to execute arbitrary scripts within the administrative context, potentially leading to unauthorized changes, data leakage, or pivoting to other parts of the network. In regulated industries common in Europe, such as finance, healthcare, and government, such an attack could lead to compliance violations (e.g., GDPR breaches) and reputational damage. Multisite WordPress setups, often used by large organizations and educational institutions, are particularly at risk because the usual unfiltered_html restriction does not mitigate this vulnerability. The lack of known exploits reduces immediate risk but should not lead to complacency given the ease of exploitation once an attacker has admin privileges.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the chartjs plugin version 2023.2. Until an official patch is released, organizations should restrict administrative access strictly to trusted users and enforce strong authentication mechanisms such as multi-factor authentication (MFA). Regularly review and monitor admin user activities for suspicious behavior. Consider disabling or removing the chartjs plugin if it is not essential. Implement Content Security Policy (CSP) headers to reduce the impact of XSS attacks by restricting the execution of unauthorized scripts. Additionally, organizations should keep WordPress core and all plugins updated and subscribe to vulnerability feeds to apply patches promptly once available. For multisite environments, extra caution should be taken to monitor and restrict admin-level user capabilities. Employ web application firewalls (WAFs) that can detect and block XSS payloads as an additional layer of defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-11-10T19:52:11.989Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd9d57
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 3:56:27 PM
Last updated: 7/26/2025, 1:50:07 PM
Views: 10
Related Threats
CVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighCVE-2025-40768: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens SINEC Traffic Analyzer
HighCVE-2025-40767: CWE-250: Execution with Unnecessary Privileges in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.