[Japanese]

JVNDB-2023-000084

WordPress Plugin "Advanced Custom Fields" vulnerable to cross-site scripting

Overview

WordPress Plugin "Advanced Custom Fields" provided by WP Engine contains a cross-site scripting vulnerability (CWE-79).

Ryotaro Imamura of SB Technology Corp. and Satoo Nakano reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 5.4 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: Required
  • Scope: Changed
  • Confidentiality Impact: Low
  • Integrity Impact: Low
  • Availability Impact: None
CVSS V2 Severity:
Base Metrics 3.5 (Low) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: Single Instance
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products


WP Engine
  • Advanced Custom Fields versions 6.1.0 to 6.1.7
  • Advanced Custom Fields Advanced Custom Fields Pro versions 6.1.0 to 6.1.7

Impact

An arbitrary script may be executed on the web browser of the user who is logging in to the product with the editor or higher privilege.
Solution

[Update the plugin]
Update the plugin according to the information provided by the developer.
The developer has released the versions listed below that address the vulnerability.

* Advanced Custom Fields 6.1.8
* Advanced Custom Fields Pro 6.1.8
Vendor Information

WP Engine
CWE (What is CWE?)

  1. Cross-site Scripting(CWE-79) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2023-40068
References

  1. JVN : JVN#98946408
  2. National Vulnerability Database (NVD) : CVE-2023-40068
Revision History

  • [2023/08/21]
      Web page was published
  • [2023/09/08]
      Overview was modified
  • [2024/03/25]
      References : Content was added