CVE-2022-4519

The WP User plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters in versions up to, and including, 7.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpseeds:wp_user:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:35

Type Values Removed Values Added
References () https://wordpress.org/plugins/wp-user/#description - Product () https://wordpress.org/plugins/wp-user/#description - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/8ee21796-5340-4f84-b1c4-a95137a27223 - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/8ee21796-5340-4f84-b1c4-a95137a27223 - Third Party Advisory
CVSS v2 : unknown
v3 : 4.8
v2 : unknown
v3 : 5.5

07 Nov 2023, 03:58

Type Values Removed Values Added
CWE CWE-79

Information

Published : 2022-12-15 21:15

Updated : 2024-11-21 07:35


NVD link : CVE-2022-4519

Mitre link : CVE-2022-4519

CVE.ORG link : CVE-2022-4519


JSON object : View

Products Affected

wpseeds

  • wp_user
CWE

No CWE.