Sploit.io - Search

Product: I Recommend This, version: >= n/a, <= 3.8.3

CVE-2023-23673

Severity: MEDIUM

Description: Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Harish Chouhan, Themeist I Recommend This plugin <= 3.8.3 versions.

CVSS Score: 5.9

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000800000
  • Percentile: 0.233890000
  • Date: 2026-04-29

ExploitDB

No data available.

HackerOne Data

  • Rank: 9224
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Harish Chouhan, Themeist I Recommend This - Versions: n/a

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, CVE-2023-23673, is an authenticated Stored Cross-Site Scripting (XSS) vulnerability within the “I Recommend This” WordPress plugin, specifically versions up to and including 3.8.3. This means an attacker with administrator or higher privileges on a WordPress site utilizing this plugin can inject malicious JavaScript code that will be stored on the server and executed in the browsers of other users who view the affected content. The base CVSS score is 5.9 (Medium), indicating a moderate level of risk. The EPSS score is quite low at 0.0008, suggesting it’s not a widely exploited vulnerability, but still poses a threat. The attack vector is network-based, and exploitation requires user interaction. The impact is considered low for confidentiality, integrity, and availability, but the scope is changed, meaning the attacker can potentially impact other parts of the web application beyond just the immediate context of the XSS. The business impact could include defacement of the website, theft of user cookies (potentially leading to session hijacking), redirection of users to malicious websites, or modification of content displayed to users. Likelihood of exploitation is moderate, as it requires an authenticated user with admin+ privileges, but ease of exploitation is relatively high once authenticated, as XSS vulnerabilities can often be exploited with relatively simple JavaScript payloads.

    2. Potential Attack Scenarios
    An attacker with administrator access to a WordPress site using the “I Recommend This” plugin could inject malicious JavaScript code into a field within the plugin’s settings, such as the recommended items list or a description field. For example, the attacker could add an item and in the description field include the following payload: <script>alert('XSS Attack!');</script>. When a user with lower privileges (e.g., editor, author) views a page where the recommended items are displayed, the JavaScript code will execute, displaying an alert box. A more sophisticated attacker could use this to steal the user’s cookies, redirect them to a phishing page, or modify the website's appearance. The attack vector is via the network, and the attacker needs to be authenticated to the WordPress site with at least administrative privileges to initially inject the malicious script. The outcome is that users viewing the affected page are exposed to the malicious script, potentially compromising their session or leading to further exploitation.

    3. Mitigation Recommendations
    The primary mitigation for this vulnerability is to upgrade the “I Recommend This” plugin to the latest version (greater than 3.8.3) as soon as possible. Patchstack, the vulnerability discoverer, provides detailed information and the updated version can be downloaded from the WordPress plugin repository. Additional mitigation steps include:
    * Ensure WordPress itself is up to date to the latest version.
    * Regularly review user roles and permissions to limit the number of users with administrative privileges.
    * Implement a Web Application Firewall (WAF) to filter out malicious scripts.
    * Consider using Content Security Policy (CSP) to restrict the sources from which scripts can be loaded.
    Relevant Resources:
    * Patchstack Vulnerability Details: https://patchstack.com/database/vulnerability/i-recommend-this/wordpress-i-recommend-this-plugin-3-8-3-cross-site-scripting-xss-vulnerability?_s_id=cve
    * PacketStorm Security: https://packetstormsecurity.com/search/?q=CVE-2023-23673

    4. Executive Summary
    The “I Recommend This” WordPress plugin is vulnerable to a Cross-Site Scripting (XSS) attack (CVE-2023-23673). This vulnerability allows an attacker with administrative access to inject malicious code that can impact users viewing content on the website. While the risk is currently assessed as medium, the impact could include website defacement, user session hijacking, or redirection to malicious websites. The most effective way to address this vulnerability is to upgrade the "I Recommend This" plugin to the latest version. Prompt patching is recommended to minimize the risk of exploitation and protect your website and its users. Delaying the update could lead to a compromise of user data or a negative impact on the website’s credibility. This is especially important if your website relies on user trust and consistent branding.