{"api_version":"1","generated_at":"2026-04-23T21:02:09+00:00","cve":"CVE-2023-0285","urls":{"html":"https://cve.report/CVE-2023-0285","api":"https://cve.report/api/cve/CVE-2023-0285.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-0285","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-0285"},"summary":{"title":"CVE-2023-0285","description":"The Real Media Library WordPress plugin before 4.18.29 does not sanitise and escape the created folder names, which could allow users with the role of author and above to perform Stored Cross-Site Scripting attacks.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2023-02-21 09:15:00","updated_at":"2023-11-07 04:00:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348","name":"https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348","refsource":"MISC","tags":[],"title":"Real Media Library < 4.18.29 - Author+ Stored XSS WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-0285","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0285","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"285","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"devowl","cpe5":"real_media_library","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-0285","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Real Media Library WordPress plugin before 4.18.29 does not sanitise and escape the created folder names, which could allow users with the role of author and above to perform Stored Cross-Site Scripting attacks."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-Site Scripting (XSS)"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Real Media Library: Media Library Folder & File Manager","version":{"version_data":[{"version_affected":"<","version_name":"0","version_value":"4.18.29"}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348","refsource":"MISC","name":"https://wpscan.com/vulnerability/adf09e29-baf5-4426-a281-6763c107d348"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Bipul Jaiswal from SecureLayer7"},{"lang":"en","value":"WPScan"}]},"nvd":{"publishedDate":"2023-02-21 09:15:00","lastModifiedDate":"2023-11-07 04:00:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:devowl:real_media_library:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"4.18.29","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}