CVE-2023-1372
WH Testimonials <= 3.0.0 - Unauthenticated Stored Cross-Site Scripting
CVSS Score
7.2
EPSS Score
0.0%
EPSS Percentile
0th
The WH Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters such as wh_homepage, wh_text_short, wh_text_full and in versions up to, and including, 3.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
| CWE | CWE-79 |
| Vendor | webhostings |
| Product | wh testimonials |
| Published | Mar 13, 2023 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for webhostings wh testimonials
Be the first to know when new high vulnerabilities affecting webhostings wh testimonials are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
webhostings / WH Testimonials
0 โค 3.0.0
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/b6fe5f1a-787e-4662-915f-c6f04961e194?source=cve danielkelley.me: https://danielkelley.me/wh-testimonials-reflected-xss-vulnerability-via-wh-homepage-parameter-in-version-3-0-0-and-below/ plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/wh-testimonials/trunk/wh-testimonials.php#L177 wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/b6fe5f1a-787e-4662-915f-c6f04961e194
Credits
Daniel Kelley