First published: Mon May 30 2022(Updated: )
The Smush WordPress plugin before 3.9.9 does not sanitise and escape a configuration parameter before outputting it back in an admin page when uploading a malicious preset configuration, leading to a Reflected Cross-Site Scripting. For the attack to be successful, an attacker would need an admin to upload a malicious configuration file
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Smush Image Compression and Optimization | <3.9.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1009 is a vulnerability in the Smush WordPress plugin before version 3.9.9 that allows for a Reflected Cross-Site Scripting attack.
CVE-2022-1009 has a severity rating of 6.1, which is considered medium.
The Smush WordPress plugin versions up to and excluding 3.9.9 are affected by CVE-2022-1009.
To fix CVE-2022-1009, you should update the Smush WordPress plugin to version 3.9.9 or higher.
The CWE ID for CVE-2022-1009 is 79.