First published: Mon Mar 07 2022(Updated: )
The White Label CMS WordPress plugin before 2.2.9 does not sanitise and validate the wlcms[_login_custom_js] parameter before outputting it back in the response while previewing, leading to a Reflected Cross-Site Scripting issue
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Videousermanuals White Label Cms | <2.2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0422 refers to a vulnerability in the White Label CMS WordPress plugin before version 2.2.9 that allows for a Reflected Cross-Site Scripting (XSS) issue.
CVE-2022-0422 has a severity level of medium, with a CVSS score of 6.1.
CVE-2022-0422 impacts the White Label CMS WordPress plugin by allowing an attacker to execute malicious JavaScript code via a reflected XSS attack.
To fix CVE-2022-0422, it is recommended to update the White Label CMS WordPress plugin to version 2.2.9 or newer.
More information about CVE-2022-0422 can be found at the following references: [Reference 1](https://plugins.trac.wordpress.org/changeset/2672615) and [Reference 2](https://wpscan.com/vulnerability/429be4eb-8a6b-4531-9465-9ef0d35c12cc).