Vulnerability Details CVE-2023-0376
The Qubely WordPress plugin before 1.8.5 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 45.7%
CVSS Severity
CVSS v3 Score 5.4
Products affected by CVE-2023-0376
-
cpe:2.3:a:themeum:qubely:-
-
cpe:2.3:a:themeum:qubely:1.2.8
-
cpe:2.3:a:themeum:qubely:1.2.9
-
cpe:2.3:a:themeum:qubely:1.3.0
-
cpe:2.3:a:themeum:qubely:1.3.1
-
cpe:2.3:a:themeum:qubely:1.3.2
-
cpe:2.3:a:themeum:qubely:1.3.3
-
cpe:2.3:a:themeum:qubely:1.3.4
-
cpe:2.3:a:themeum:qubely:1.3.5
-
cpe:2.3:a:themeum:qubely:1.3.6
-
cpe:2.3:a:themeum:qubely:1.3.7
-
cpe:2.3:a:themeum:qubely:1.3.8
-
cpe:2.3:a:themeum:qubely:1.3.9
-
cpe:2.3:a:themeum:qubely:1.3.91
-
cpe:2.3:a:themeum:qubely:1.4.0
-
cpe:2.3:a:themeum:qubely:1.4.1
-
cpe:2.3:a:themeum:qubely:1.5.0
-
cpe:2.3:a:themeum:qubely:1.5.1
-
cpe:2.3:a:themeum:qubely:1.5.2
-
cpe:2.3:a:themeum:qubely:1.5.3
-
cpe:2.3:a:themeum:qubely:1.5.4
-
cpe:2.3:a:themeum:qubely:1.5.5
-
cpe:2.3:a:themeum:qubely:1.6.0
-
cpe:2.3:a:themeum:qubely:1.6.1
-
cpe:2.3:a:themeum:qubely:1.6.2
-
cpe:2.3:a:themeum:qubely:1.6.3
-
cpe:2.3:a:themeum:qubely:1.6.4
-
cpe:2.3:a:themeum:qubely:1.6.5
-
cpe:2.3:a:themeum:qubely:1.6.6
-
cpe:2.3:a:themeum:qubely:1.6.7
-
cpe:2.3:a:themeum:qubely:1.6.8
-
cpe:2.3:a:themeum:qubely:1.6.9
-
cpe:2.3:a:themeum:qubely:1.7.0
-
cpe:2.3:a:themeum:qubely:1.7.1
-
cpe:2.3:a:themeum:qubely:1.7.2
-
cpe:2.3:a:themeum:qubely:1.7.3
-
cpe:2.3:a:themeum:qubely:1.7.4
-
cpe:2.3:a:themeum:qubely:1.7.5
-
cpe:2.3:a:themeum:qubely:1.7.6
-
cpe:2.3:a:themeum:qubely:1.7.7
-
cpe:2.3:a:themeum:qubely:1.7.8
-
cpe:2.3:a:themeum:qubely:1.7.9
-
cpe:2.3:a:themeum:qubely:1.8.0
-
cpe:2.3:a:themeum:qubely:1.8.1
-
cpe:2.3:a:themeum:qubely:1.8.2
-
cpe:2.3:a:themeum:qubely:1.8.3
-
cpe:2.3:a:themeum:qubely:1.8.4