First published: Mon Jun 27 2022(Updated: )
The Login using WordPress Users ( WP as SAML IDP ) WordPress plugin before 1.13.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Miniorange Login Using Wordpress Users | <1.1.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2022-1010.
The severity of CVE-2022-1010 is medium with a score of 4.8.
The Login using WordPress Users plugin before 1.13.4 does not sanitize and escape some of its settings.
High privilege users such as admins can potentially perform Stored Cross-Site Scripting attacks with the plugin.
The affected software version of the Login using WordPress Users plugin is up to version 1.1.34.