CVE-2023-46640
Medium
|5.4Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with contributor-level access or higher to inject malicious scripts into the Medialist plugin, which can then be executed in the browsers of users who view the affected content. This means that if an attacker can log in as a contributor or more privileged user, they can potentially steal sensitive information or perform actions on behalf of other users.
Technical Description
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in D. Relton Medialist plugin <= 1.3.9 versions.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$741($500-$1K)
Vendor Response
Grade FPatched in 856 days
Quick Information
Published
Nov 8, 2023
over 2 years ago
Last Modified
Mar 13, 2026
25 days ago
Vendor
drelton
Product
medialist