{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-5653","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","dateReserved":"2023-10-19T11:49:37.990Z","datePublished":"2023-11-27T16:22:01.293Z","dateUpdated":"2024-08-02T08:07:32.554Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-11-27T16:22:01.293Z"},"title":"WassUp Real Time Analytics <= 1.9.4.5 - Unauthenticated Stored XSS","problemTypes":[{"descriptions":[{"description":"CWE-79 Cross-Site Scripting (XSS)","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"WassUp Real Time Analytics","versions":[{"status":"affected","versionType":"semver","version":"0","lessThanOrEqual":"1.9.4.5"}],"defaultStatus":"affected","collectionURL":"https://wordpress.org/plugins"}],"descriptions":[{"lang":"en","value":"The WassUp Real Time Analytics WordPress plugin through 1.9.4.5 does not escape IP address provided via some headers before outputting them back in an admin page, allowing unauthenticated users to perform Stored XSS attacks against logged in admins"}],"references":[{"url":"https://wpscan.com/vulnerability/76316621-1987-44ea-83e5-6ca884bdd1c0","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"Krzysztof Zając","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:07:32.554Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/76316621-1987-44ea-83e5-6ca884bdd1c0","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]}]}}