Skip to main content

CVE-2023-6163: CWE-79 Cross-Site Scripting (XSS) in Unknown WP Crowdfunding

Medium
VulnerabilityCVE-2023-6163cvecve-2023-6163cwe-79
Published: Mon Jan 15 2024 (01/15/2024, 15:10:41 UTC)
Source: CVE Database V5
Vendor/Project: Unknown
Product: WP Crowdfunding

Description

The WP Crowdfunding WordPress plugin before 2.1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/11/2025, 00:03:12 UTC

Technical Analysis

CVE-2023-6163 is a medium-severity vulnerability identified in the WP Crowdfunding WordPress plugin versions prior to 2.1.10. The issue is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79. It arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite configurations, which typically restricts the ability to post unfiltered HTML. The attack vector requires high privileges (admin level) and some user interaction, as the malicious script is executed when the stored data is viewed or processed by other users or administrators. The CVSS 3.1 base score is 4.8, reflecting a medium severity level, with the vector indicating network attack vector, low attack complexity, high privileges required, user interaction required, scope changed, and limited confidentiality and integrity impacts but no availability impact. No known exploits are currently reported in the wild, and no official patches or updates are linked yet, though the issue is addressed in version 2.1.10 and later. The vulnerability's impact lies primarily in the potential for privilege escalation within the administrative context, session hijacking, or defacement of administrative interfaces through malicious script execution.

Potential Impact

For European organizations using WordPress sites with the WP Crowdfunding plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of administrative sessions and data. Since exploitation requires admin-level access, the threat is more about abuse of existing privileges rather than initial compromise. However, if an attacker gains admin credentials or if an insider is malicious, they could inject persistent malicious scripts that execute in the context of other administrators or privileged users. This could lead to session hijacking, theft of sensitive information, or manipulation of crowdfunding campaign data. Given the popularity of WordPress across Europe and the growing use of crowdfunding platforms, organizations running such plugins could face reputational damage, data breaches, or unauthorized changes to their fundraising campaigns. The vulnerability is less likely to impact availability but could facilitate further attacks if chained with other vulnerabilities or social engineering. Multisite WordPress installations, common in larger organizations or agencies, are particularly at risk since the usual unfiltered_html restrictions do not mitigate this vulnerability.

Mitigation Recommendations

European organizations should immediately verify if they are using the WP Crowdfunding plugin and check the version. Upgrading to version 2.1.10 or later, where the vulnerability is fixed, is the primary mitigation step. Until an upgrade is possible, organizations should restrict admin access strictly, enforce strong authentication mechanisms (e.g., MFA), and monitor administrative actions for suspicious behavior. Additionally, review and sanitize all plugin settings inputs manually if feasible. Implement Content Security Policy (CSP) headers to limit the impact of potential XSS payloads. For multisite setups, consider additional restrictions on plugin usage and administrative privileges. Regularly audit installed plugins for updates and vulnerabilities, and maintain a robust incident response plan to quickly address any signs of exploitation. Finally, educate administrators about the risks of stored XSS and the importance of cautious input handling.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-11-15T18:15:05.982Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f5a1b0bd07c3938ab76

Added to database: 6/10/2025, 6:54:18 PM

Last enriched: 7/11/2025, 12:03:12 AM

Last updated: 8/18/2025, 11:28:49 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats