CVE-2023-25023

Medium
|4.8
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with admin access to inject malicious scripts into the Webinar Ignition plugin, which can then execute when other users view the affected content. It requires the attacker to have administrative privileges, making it a risk primarily for organizations with compromised admin accounts.

Technical Description

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Saleswonder.Biz Webinar ignition plugin <= 2.14.2 versions.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$638($500-$1K)
Vendor Response
Grade FPatched in 1048 days

Quick Information

Published

Apr 7, 2023

almost 3 years ago

Last Modified

Feb 18, 2026

2 days ago

Vendor

saleswonder

Product

webinarignition