Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-2272

Severity
6.1MEDIUM
EPSS
22.7%
top 4.13%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 16

Description

The Tiempo.com WordPress plugin through 0.1.2 does not sanitise and escape the page parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages2 packages

NVDtiempo/tiempo0.1.2
CVEListV5unknown/tiempo.com0.1.2

🔴Vulnerability Details

2
GHSA
GHSA-px5c-85f9-xr32: The Tiempo2023-08-16
CVEList
Tiempo.com <= 0.1.2 - Reflected XSS2023-08-16

💥Exploits & PoCs

1
Nuclei
Tiempo.com <= 0.1.2 - Cross-Site Scripting
CVE-2023-2272 (MEDIUM CVSS 6.1) | The Tiempo.com WordPress plugin thr | cvebase.io