CVE-2023-7168: CWE-79 Cross-Site Scripting (XSS) in Unknown Better Follow Button for Jetpack
The Better Follow Button for Jetpack WordPress plugin through 8.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI Analysis
Technical Summary
CVE-2023-7168 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the Better Follow Button for Jetpack WordPress plugin up to version 8.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts within the plugin's settings. Notably, this attack vector is exploitable even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts HTML input for security reasons. The vulnerability requires high privilege (admin) and user interaction (an admin must save crafted input), but it can lead to stored XSS attacks that execute malicious JavaScript in the context of other administrators or users viewing the affected settings or plugin interface. The CVSS 3.1 base score is 4.8 (medium), reflecting network attack vector, low attack complexity, high privileges required, user interaction required, and partial impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild, and no official patches or updates have been linked yet. The vulnerability was published on May 15, 2025, and assigned by WPScan. Stored XSS in admin settings can lead to session hijacking, privilege escalation, or persistent defacement, making it a significant risk in environments with multiple administrators or where admins might be targeted via social engineering or phishing to save malicious settings.
Potential Impact
For European organizations using WordPress sites with the Better Follow Button for Jetpack plugin, this vulnerability poses a moderate risk. Organizations with multisite WordPress installations or multiple administrators are particularly vulnerable because the exploit bypasses typical HTML filtering restrictions. Successful exploitation could allow attackers to execute arbitrary JavaScript in the browsers of other administrators, potentially leading to credential theft, session hijacking, or further compromise of the WordPress environment. This can result in unauthorized access to sensitive data, defacement of websites, or use of the compromised site as a launchpad for further attacks. Given the widespread use of WordPress in Europe for corporate, governmental, and e-commerce websites, the vulnerability could impact confidentiality and integrity of data and disrupt administrative control. However, the requirement for high privileges and user interaction limits the attack surface primarily to insider threats or attackers who have already compromised an admin account. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Better Follow Button for Jetpack plugin, especially versions up to 8.0. Until an official patch is released, administrators should restrict plugin configuration access to the minimum number of trusted users and implement strict administrative policies to prevent unauthorized changes. Employing Web Application Firewalls (WAF) with custom rules to detect and block suspicious script injections in plugin settings can help mitigate exploitation attempts. Regular monitoring of admin activity logs for unusual changes or inputs is advised. Organizations should also educate administrators about the risks of saving untrusted input and encourage the use of strong, unique credentials combined with multi-factor authentication to reduce the risk of account compromise. Once a patch becomes available, prompt application is critical. Additionally, consider isolating multisite environments and limiting the use of plugins with known vulnerabilities until they are verified secure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-7168: CWE-79 Cross-Site Scripting (XSS) in Unknown Better Follow Button for Jetpack
Description
The Better Follow Button for Jetpack WordPress plugin through 8.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
AI-Powered Analysis
Technical Analysis
CVE-2023-7168 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) affecting the Better Follow Button for Jetpack WordPress plugin up to version 8.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts within the plugin's settings. Notably, this attack vector is exploitable even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts HTML input for security reasons. The vulnerability requires high privilege (admin) and user interaction (an admin must save crafted input), but it can lead to stored XSS attacks that execute malicious JavaScript in the context of other administrators or users viewing the affected settings or plugin interface. The CVSS 3.1 base score is 4.8 (medium), reflecting network attack vector, low attack complexity, high privileges required, user interaction required, and partial impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild, and no official patches or updates have been linked yet. The vulnerability was published on May 15, 2025, and assigned by WPScan. Stored XSS in admin settings can lead to session hijacking, privilege escalation, or persistent defacement, making it a significant risk in environments with multiple administrators or where admins might be targeted via social engineering or phishing to save malicious settings.
Potential Impact
For European organizations using WordPress sites with the Better Follow Button for Jetpack plugin, this vulnerability poses a moderate risk. Organizations with multisite WordPress installations or multiple administrators are particularly vulnerable because the exploit bypasses typical HTML filtering restrictions. Successful exploitation could allow attackers to execute arbitrary JavaScript in the browsers of other administrators, potentially leading to credential theft, session hijacking, or further compromise of the WordPress environment. This can result in unauthorized access to sensitive data, defacement of websites, or use of the compromised site as a launchpad for further attacks. Given the widespread use of WordPress in Europe for corporate, governmental, and e-commerce websites, the vulnerability could impact confidentiality and integrity of data and disrupt administrative control. However, the requirement for high privileges and user interaction limits the attack surface primarily to insider threats or attackers who have already compromised an admin account. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as the vulnerability is publicly disclosed.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Better Follow Button for Jetpack plugin, especially versions up to 8.0. Until an official patch is released, administrators should restrict plugin configuration access to the minimum number of trusted users and implement strict administrative policies to prevent unauthorized changes. Employing Web Application Firewalls (WAF) with custom rules to detect and block suspicious script injections in plugin settings can help mitigate exploitation attempts. Regular monitoring of admin activity logs for unusual changes or inputs is advised. Organizations should also educate administrators about the risks of saving untrusted input and encourage the use of strong, unique credentials combined with multi-factor authentication to reduce the risk of account compromise. Once a patch becomes available, prompt application is critical. Additionally, consider isolating multisite environments and limiting the use of plugins with known vulnerabilities until they are verified secure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-12-29T03:30:20.560Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeafce
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/4/2025, 11:10:44 AM
Last updated: 7/28/2025, 7:24:03 PM
Views: 10
Related Threats
CVE-2025-52335: n/a
UnknownCVE-2025-8971: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8970: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-50515: n/a
CriticalCVE-2025-50817: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.