CVE-2023-54358
Description
WordPress adivaha Travel Plugin 2.3 contains a reflected cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts by manipulating the isMobile parameter. Attackers can craft malicious URLs containing JavaScript payloads in the isMobile GET parameter at the /mobile-app/v3/ endpoint to execute arbitrary code in victims' browsers and steal session tokens or credentials.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unauthenticated reflected XSS in WordPress adivaha Travel Plugin 2.3 via the isMobile GET parameter at /mobile-app/v3/.
Vulnerability
Overview
CVE-2023-54358 describes a reflected cross-site scripting (XSS) vulnerability in the WordPress adivaha Travel Plugin version 2.3. The root cause is improper neutralization of user-supplied input in the isMobile GET parameter at the /mobile-app/v3/ endpoint. This allows an unauthenticated attacker to inject arbitrary JavaScript code that is reflected back to the victim's browser.[1][3][4]
Exploitation
Conditions
An attacker can craft a malicious URL containing a JavaScript payload in the isMobile parameter and deliver it to a victim via email, instant message, or other means. No special prerequisites such as authentication or specific user permissions are required, making the attack surface broad. The victim merely needs to click the crafted link while logged into a WordPress site running the vulnerable plugin version.[3][4]
Impact
Successful exploitation enables the attacker to execute arbitrary JavaScript in the victim's browser in the context of the vulnerable plugin's page. This can be leveraged to steal session tokens, login credentials, or perform other actions on behalf of the victim within the WordPress application. The CVSS v3 base score of 6.1 (Medium) reflects the need for user interaction, but the attack can lead to significant compromise of the victim's account and data.[1][3][4]
Mitigation
Status
At the time of publication, a patched version has not been confirmed; users should apply vendor updates when available. Considering the low complexity of exploitation and availability of a public exploit, organizations using security plugins that filter GET parameters or a WAF until a fix is deployed.[4]
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.