CVE-2023-25023
Medium
|4.8No Exploit
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with admin access to inject malicious scripts into the Webinar Ignition plugin, which can then execute when other users view the affected content. It requires the attacker to have administrative privileges, making it a risk primarily for organizations with compromised admin accounts.
Technical Description
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Saleswonder.Biz Webinar ignition plugin <= 2.14.2 versions.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$638($500-$1K)
Vendor Response
Grade FPatched in 1048 days
Quick Information
Published
Apr 7, 2023
almost 3 years ago
Last Modified
Feb 18, 2026
2 days ago
Vendor
saleswonder
Product
webinarignition