🔐 CVE Alert

CVE-2023-4520

MEDIUM 5.4

FV Flowplayer Video Player <= 7.5.37.7212 - Insufficient Input Validation to Unauthenticated Stored Cross-Site Scripting and Arbitrary Usermeta Update

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th

The FV Flowplayer Video Player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘_fv_player_user_video’ parameter saved via the 'save' function hooked via init, and the plugin is also vulnerable to Arbitrary Usermeta Update via the 'save' function in versions up to, and including, 7.5.37.7212 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page, and makes it possible to update the user metas arbitrarily, but the meta value can only be a string.

CWE CWE-79
Vendor foliovision
Product fv flowplayer video player
Published Aug 25, 2023
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for foliovision fv flowplayer video player

Be the first to know when new medium vulnerabilities affecting foliovision fv flowplayer video player are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

foliovision / FV Flowplayer Video Player
0 ≤ 7.5.37.7212

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/c55ca7d4-6bc0-49c9-8ce0-50fff8775a76?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/2957322/fv-wordpress-flowplayer#file2 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/fv-wordpress-flowplayer/tags/7.5.36.7212/models/custom-videos.php#L341

Credits

István Márton