The Breakdance plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's custom postmeta output in all versions up to, and including, 1.7.0 due to insufficient input sanitization and output escaping on user supplied post meta fields. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Metrics
Affected Vendors & Products
References
History
Fri, 10 Apr 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Breakdance <= 1.7.0 - Authenticated(Contributor+) Stored Cross-Site Scripting via custom postmeta | |
| Weaknesses | CWE-79 |
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-05-06T11:03:50.325Z
Updated: 2026-04-08T17:30:43.449Z
Reserved: 2023-12-15T16:52:21.539Z
Link: CVE-2023-6854
Updated: 2024-08-02T08:42:08.415Z
Status : Deferred
Published: 2024-05-06T11:15:46.930
Modified: 2026-04-15T00:35:42.020
Link: CVE-2023-6854
No data.