Pretty Url Vulnerability (Medium) – CVE-2023-2009

Pretty Url Vulnerability (Medium) – CVE-2023-2009

by | Mar 18, 2026 | Plugins

Attack Vectors

CVE-2023-2009 is a Medium-severity (CVSS 4.4) stored cross-site scripting (XSS) issue in the Pretty Url WordPress plugin (slug: pretty-url) affecting versions prior to 1.5.5. An attacker must already be authenticated with administrator-level permissions (or higher) to inject malicious script through the plugin’s admin settings.

This risk is most relevant in organizations where admin access is shared across teams, where admin credentials could be phished or reused, or where third parties have elevated access. The issue only affects WordPress multi-site installations and sites where unfiltered_html has been disabled, which may apply in more controlled or compliance-driven environments.

Security Weakness

The underlying weakness is insufficient input sanitization and output escaping in Pretty Url’s admin settings (versions up to, but not including, 1.5.5). As a result, content saved in settings can be stored and later rendered in a way that allows injected scripts to run in a user’s browser.

Because this is a stored XSS, the malicious code can persist until removed—meaning the impact may continue over time and affect multiple users who view the impacted pages or settings screens.

Technical or Business Impacts

Even though this vulnerability requires Admin+ access, it can still create meaningful business risk because it can be used to turn one compromised privileged account into broader, harder-to-detect damage. Potential impacts include unauthorized content changes, hidden redirects, injection of third-party scripts, and actions performed in a trusted user’s session.

From a business perspective, stored XSS can undermine brand trust (malicious popups/redirects), disrupt lead-gen and campaign landing pages, and create incident response and compliance burdens if any customer data or authenticated sessions are exposed. For regulated teams, it may also trigger reporting obligations depending on what the injected scripts access or alter.

Remediation: Update Pretty Url to version 1.5.5 or newer (patched). Validate that your WordPress multi-site configuration and any policies disabling unfiltered_html are understood and documented, since they affect exposure for this specific issue. Reference: CVE-2023-2009 and Wordfence advisory.

Similar Attacks

Stored XSS has been used in real-world incidents to spread quickly and hijack trusted sessions. Examples include:

The “Samy” MySpace worm (a classic stored XSS case that propagated through user profiles), and
the TweetDeck XSS worm (where malicious scripts spread via automatically executed actions).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers