The Page View Count WordPress plugin before 2.6.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/009ca72e-e8fa-4fdc-ab2d-4210f8f4710f | Exploit Third Party Advisory | 
| https://wpscan.com/vulnerability/009ca72e-e8fa-4fdc-ab2d-4210f8f4710f | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://wpscan.com/vulnerability/009ca72e-e8fa-4fdc-ab2d-4210f8f4710f - Exploit, Third Party Advisory | 
07 Nov 2023, 03:59
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | 
Information
                Published : 2023-02-06 20:15
Updated : 2025-03-25 19:15
NVD link : CVE-2023-0095
Mitre link : CVE-2023-0095
CVE.ORG link : CVE-2023-0095
JSON object : View
Products Affected
                a3rev
- page_view_count
CWE
                No CWE.
