A recently discovered stored Cross-Site Scripting (XSS) vulnerability has been found in the Smart App Banner plugin (created by Stephen Darlington, Wandle Software Limited). This plugin is designed for WordPress sites to allow website owners to display a banner promoting their mobile apps. The plugin versions affected by this vulnerability are v1.1.3 and below.


The vulnerability, tracked as CVE-2023-46200, was discovered by an independent cybersecurity researcher and has been confirmed by the plugin developer. Specifically, this security flaw allows attackers to inject malicious script into the plugin's configuration settings, which will be executed when an administrator with elevated privileges accesses the plugin in the WordPress admin area. This could lead to stolen login credentials, unauthorized changes to the website, or even complete takeovers of administrator accounts.

Code Snippet Example

To demonstrate the vulnerability, let's have a look at an example where a malicious user submits the following payload to the "app_id" parameter of the Smart App Banner plugin's settings:

" data-app=""><script>alert('XSS');</script><span x="

Upon saving the settings, the injected code will be executed in the administrator's browser whenever they access the Smart App Banner plugin settings page.

Original References & Exploit Details

The following links provide more information about CVE-2023-46200, as well as further insight into the vulnerability and its potential impacts:

1. CVE-2023-46200 Vulnerability Details - National Vulnerabilities Database (NVD)
2. Smart App Banner Plugin v1.1.3 and below - Exploit Database
3. Wandle Software Limited's Smart App Banner Plugin page

Mitigation & Recommendations

It is crucial for anyone using the Smart App Banner plugin v1.1.3 or below to update to the latest available version as soon as possible. Updating the plugin should patch the vulnerability and mitigate the risk of potential attacks. Additionally, ensure that your WordPress installation, plugins, and themes are up-to-date, as attackers constantly exploit outdated software for unauthorized access and malicious activities.

To further protect your website from similar exploits, consider the following security practices

1. Implement Content Security Policy (CSP) to restrict the types of content that can be executed by the browser.
2. Utilize server-side input validation and output encoding to prevent scripting attacks against your site.
3. Regularly scan your website for vulnerabilities using automated security tools or hire a professional security team to conduct routine penetration tests.
4. Implement two-factor authentication (2FA) for administrator accounts to minimize the risk of unauthorized access.
5. Educate yourself and other administrators on common web vulnerabilities and their consequences, as well as safe web development practices.


The CVE-2023-46200 vulnerability in Smart App Banner by Wandle Software Limited is a severe threat, capable of compromising the entire website or administrator accounts. It is crucial for users to update the plugin immediately and follow security best practices to be proactive in protecting their websites from potential exploits. By staying informed, you can defend your site against attackers and ensure the safety of your users and data.


Published on: 10/27/2023 21:15:09 UTC
Last modified on: 10/31/2023 15:23:38 UTC