{"api_version":"1","generated_at":"2026-04-23T14:24:53+00:00","cve":"CVE-2023-4294","urls":{"html":"https://cve.report/CVE-2023-4294","api":"https://cve.report/api/cve/CVE-2023-4294.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-4294","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-4294"},"summary":{"title":"CVE-2023-4294","description":"The URL Shortify WordPress plugin before 1.7.6 does not properly escape the value of the referer header, thus allowing an unauthenticated attacker to inject malicious javascript that will trigger in the plugins admin panel with statistics of the created short link.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2023-09-11 20:15:00","updated_at":"2023-11-07 04:22:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/1fc71fc7-861a-46cc-a147-1c7ece9a7776","name":"https://wpscan.com/vulnerability/1fc71fc7-861a-46cc-a147-1c7ece9a7776","refsource":"MISC","tags":[],"title":"URL Shortify < 1.7.6 - Unauthenticated Stored XSS via referer header WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-4294","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4294","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"4294","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kaizencoders","cpe5":"url_shortify","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-4294","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The URL Shortify WordPress plugin before 1.7.6 does not properly escape the value of the referer header, thus allowing an unauthenticated attacker to inject malicious javascript that will trigger in the plugins admin panel with statistics of the created short link."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-Site Scripting (XSS)"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"URL Shortify","version":{"version_data":[{"version_affected":"<","version_name":"0","version_value":"1.7.6"}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/1fc71fc7-861a-46cc-a147-1c7ece9a7776","refsource":"MISC","name":"https://wpscan.com/vulnerability/1fc71fc7-861a-46cc-a147-1c7ece9a7776"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Bartlomiej Marek and Tomasz Swiadek"},{"lang":"en","value":"WPScan"}]},"nvd":{"publishedDate":"2023-09-11 20:15:00","lastModifiedDate":"2023-11-07 04:22:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:kaizencoders:url_shortify:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.7.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}