CVE-2023-46640

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with contributor-level access or higher to inject malicious scripts into the Medialist plugin, which can then be executed in the browsers of users who view the affected content. This means that if an attacker can log in as a contributor or more privileged user, they can potentially steal sensitive information or perform actions on behalf of other users.

Technical Description

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in D. Relton Medialist plugin <= 1.3.9 versions.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$741($500-$1K)
Vendor Response
Grade FPatched in 856 days

Quick Information

Published

Nov 8, 2023

over 2 years ago

Last Modified

Mar 13, 2026

25 days ago

Vendor

drelton

Product

medialist