WordPress Plugin Vulnerability Report – iframe – Authenticated (Contributor+) Stored Cross-Site Scripting via ‘iframe’ Shortcode – CVE-2023-4919

Plugin Name: iframe

Key Information:

  • Software Type: Plugin
  • Software Slug: iframe
  • Software Status: Active
  • Software Author: webvitaly
  • Software Downloads: 1,423,357
  • Active Installs: 100,000
  • Last Updated: September 25, 2023
  • Patched Versions: 4.6
  • Affected Versions: <=4.6

Vulnerability Details:

  • Name: iframe <= 4.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'iframe' Shortcode
  • Title: Authenticated (Contributor+) Stored Cross-Site Scripting via 'iframe' Shortcode
  • Type: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CVE: CVE-2023-4919
  • CVSS Score: 6.4 (medium)
  • Publicly Published: September 25, 2023
  • Researchers: Lana Codes and Alex Thomas
  • Description: The iframe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the iframe shortcode in versions up to, and including, 4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permission and above, to inject arbitrary web scripts into pages that will execute whenever a user accesses an injected page. This was partially patched in version 4.6 and fully patched in version 4.7.
  • References:


The iframe plugin for WordPress has a vulnerability in versions up to and including 4.6 that allows authenticated (Contributor+) users to conduct Stored Cross-Site Scripting attacks via the 'iframe' shortcode. This vulnerability has been assigned CVE-2023-4919 and has a CVSS score of 6.4 (medium). It was publicly disclosed on September 25, 2023. The issue was addressed partially in version 4.6 and fully patched in version 4.7.

Detailed Overview:

The vulnerability in the iframe plugin arises from insufficient input sanitization and output escaping. This allows attackers with contributor-level permissions or higher to inject malicious web scripts using the 'iframe' shortcode. When users access pages containing these injected scripts, they execute, potentially leading to unauthorized actions on the affected WordPress site.

The risk associated with this vulnerability is moderate, with a CVSS score of 6.4. While it requires authenticated access to exploit, it can still have serious consequences, especially if an attacker manages to compromise a contributor-level account.

Advice for Users:

  1. Immediate Action: Users are strongly advised to update the iframe plugin to version 4.7 or later, as this version contains a full patch for the vulnerability. This will help secure your WordPress installation against potential attacks.
  2. Check for Signs of Vulnerability: It's essential to monitor your website for any signs of compromise, such as unexpected changes to content or unusual behavior. Regularly scan your site for malicious code or scripts.
  3. Alternate Plugins: While the iframe plugin has been patched, if you have concerns about its security, consider using alternative plugins that offer similar functionality. Always research and choose reputable plugins from trusted sources.
  4. Stay Updated: Ensure that all your WordPress plugins, themes, and the core software are kept up to date. Regularly check for updates and apply them promptly to reduce the risk of vulnerabilities.


The swift response from the iframe plugin developers in addressing this vulnerability highlights the importance of keeping your WordPress plugins updated. Users are strongly encouraged to upgrade to version 4.7 or later to secure their WordPress installations and protect against potential cross-site scripting attacks.


Detailed Report:

Keeping your WordPress website secure should be a top priority for any business owner, but it can be challenging to stay on top of vulnerabilities in plugins and themes. Unfortunately, a serious vulnerability has recently been discovered in a popular plugin - the iframe plugin - that is used by over 100,000 WordPress sites. In this post, we'll provide an overview of the vulnerability, its risks, and most importantly, what you need to do to secure your website.

About the iframe Plugin

The iframe plugin, with over 1.4 million downloads, allows inserting iframes into WordPress posts and pages. It is an active plugin maintained by developer webvitaly.

Vulnerability Details

Versions up to and including 4.6 of the iframe plugin contain a vulnerability (CVE-2023-4919) that could enable authenticated users with contributor-level access or higher to conduct stored cross-site scripting (XSS) attacks. This issue stems from insufficient sanitization of the iframe shortcode parameters.

The vulnerability has a CVSS severity score of 6.4 (medium). If exploited, it gives attackers a foothold to inject malicious JavaScript or HTML that will execute when admin users or visitors access affected pages on the site.

Risks and Impacts

While exploitation requires authentication, a compromised user account could enable serious consequences. Attackers may be able to take unauthorized actions, steal sensitive data, or further compromise the site. XSS vulnerabilities are one of the most common and dangerous issues facing WordPress site owners.

How to Fix This Vulnerability

The good news is the iframe plugin developers have addressed this issue in recent versions:

  • Partially patched in version 4.6
  • Fully fixed in version 4.7

To mitigate any potential attacks, users are strongly advised to update to version 4.7 or higher. This will close the door on this particular vulnerability being leveraged for XSS attacks.

Past Vulnerabilities

The iframe plugin has had [3] previous vulnerabilities reported since [August 2015], indicating multiple security issues over time. This highlights the ongoing importance of updating plugins.

Staying Secure

As a WordPress site owner, staying on top of vulnerabilities in plugins, themes, and WordPress core is essential but challenging. Make it a priority to:

  • Regularly check plugins and WP for updates
  • Apply updates promptly to maintain security
  • Research plugins before installing
  • Monitor site for any signs of compromise

Keeping WordPress and its plugins updated is the most effective way to reduce security risks and prevent your site from being compromised via vulnerabilities like this iframe plugin XSS issue.

Security vulnerabilities like this one demonstrate the importance of having WordPress experts regularly monitor, maintain and update your site. At Your WP Guy, we offer ongoing management to handle updates, security monitoring, backups, uptime and support so you can stop worrying and get back to growing your business.

Let us fully audit your site to check for any signs of this vulnerability or other issues. We'll immediately update any out-of-date plugins and harden your site's security. Chat with us anytime during business hours, schedule a call or call 678-995-5169 to lock down your online presence.

WordPress Plugin Vulnerability Report – iframe – Authenticated (Contributor+) Stored Cross-Site Scripting via ‘iframe’ Shortcode – CVE-2023-4919 FAQs

Leave a Comment