VYPR
Medium severity6.5NVD Advisory· Published Nov 30, 2023· Updated Apr 28, 2026

CVE-2023-48336

CVE-2023-48336

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in cybernetikz Easy Social Icons allows Stored XSS.This issue affects Easy Social Icons: from n/a through 3.2.4.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in WordPress Easy Social Icons plugin ≤3.2.4 lets attackers inject malicious scripts via social icon fields.

Vulnerability

Overview

The Easy Social Icons plugin for WordPress, versions 3.2.4 and below, contains a Stored Cross-Site Scripting (XSS) vulnerability due to improper neutralization of input during web page generation [1]. This means that input provided through certain fields (such as social icon URLs or labels) is not properly sanitized before being stored and later rendered on pages, allowing arbitrary JavaScript or HTML to be injected.

Exploitation

Prerequisites

Exploitation requires a user with author-level privileges or higher (who can create or edit posts) to save a malicious payload into one of the plugin's input fields [1]. The attacker does not need direct access to the admin panel; a privileged user must be tricked into saving the crafted input, for example by clicking a link or visiting a crafted page [1]. Once stored, the malicious script executes automatically for any visitor viewing a page where the social icons are displayed.

Impact

A successful attack allows an unauthenticated visitor's browser to execute attacker-controlled scripts. This can lead to session hijacking, redirection to malicious sites, injection of advertisements, or theft of sensitive data [1]. The vulnerability is particularly dangerous because it does not require interaction from the end visitor—the script runs as soon as the page loads.

Mitigation

The issue is patched in version 3.2.5 of the plugin [1]. All users should update immediately. Administrators who cannot update should consider temporarily disabling the plugin or restricting the ability to create posts to trusted users only [1]. Patchstack users can enable auto-updates for vulnerable plugins. This vulnerability is also listed as one commonly used in mass-exploit campaigns, though its CVSS score is medium (6.5) [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.