Published on: Not Yet Published
Last Modified on: 01/23/2023 06:40:00 PM UTC
CVE-2023-0295Source: Mitre Source: NIST CVE.ORG Print: PDF
Certain versions of Launchpad - Coming Soon Maintenance Mode Plugin from Obox contain the following vulnerability:
The Launchpad plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of its settings parameters in versions up to, and including, 1.0.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
- CVE-2023-0295 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software: obox - Launchpad – Coming Soon & Maintenance Mode Plugin version = *
CVSS3 Score: 4.8 - MEDIUM
|403 Forbidden|| plugins.trac.wordpress.org |
Inactive LinkNot Archived
|Launchpad – Coming Soon & Maintenance Mode Plugin <= 1.0.13 - Authenticated (Administrator+) Cross-Site Scripting|| www.wordfence.com |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
|Application||Obox||Launchpad - Coming Soon Maintenance Mode Plugin||All||All||All||All|
No vendor comments have been submitted for this CVE
|@CVEreport||CVE-2023-0295 : The Launchpad plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of its… twitter.com/i/web/status/1…||2023-01-13 20:10:34|