CVE-2023-1661

The Display post meta, term meta, comment meta, and user meta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post metadata in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:display_post_meta\,_term_meta\,_comment_meta\,_and_user_meta_project:display_post_meta\,_term_meta\,_comment_meta\,_and_user_meta:*:*:*:*:*:wordpress:*:*

History

08 Apr 2026, 18:17

Type Values Removed Values Added
Summary (en) The Display post meta, term meta, comment meta, and user meta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post metadata in versions up to, and including, 0.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. (en) The Display post meta, term meta, comment meta, and user meta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post metadata in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

21 Nov 2024, 07:39

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 6.4
References () https://wordpress.org/plugins/display-metadata/#developers - Product, Release Notes () https://wordpress.org/plugins/display-metadata/#developers - Product, Release Notes
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/6f90c0d8-ede6-4f24-870f-19e888238e93?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/6f90c0d8-ede6-4f24-870f-19e888238e93?source=cve - Third Party Advisory

06 Jun 2023, 16:33

Type Values Removed Values Added
First Time Display Post Meta\, Term Meta\, Comment Meta\, And User Meta Project
Display Post Meta\, Term Meta\, Comment Meta\, And User Meta Project display Post Meta\, Term Meta\, Comment Meta\, And User Meta
CWE CWE-79
References (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/6f90c0d8-ede6-4f24-870f-19e888238e93?source=cve - (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/6f90c0d8-ede6-4f24-870f-19e888238e93?source=cve - Third Party Advisory
References (MISC) https://wordpress.org/plugins/display-metadata/#developers - (MISC) https://wordpress.org/plugins/display-metadata/#developers - Product, Release Notes
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:display_post_meta\,_term_meta\,_comment_meta\,_and_user_meta_project:display_post_meta\,_term_meta\,_comment_meta\,_and_user_meta:*:*:*:*:*:wordpress:*:*

31 May 2023, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-31 04:15

Updated : 2026-04-08 18:17


NVD link : CVE-2023-1661

Mitre link : CVE-2023-1661

CVE.ORG link : CVE-2023-1661


JSON object : View

Products Affected

display_post_meta\,_term_meta\,_comment_meta\,_and_user_meta_project

  • display_post_meta\,_term_meta\,_comment_meta\,_and_user_meta
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')