First published: Mon Jun 27 2022(Updated: )
The WordPress Security Firewall, Malware Scanner, Secure Login and Backup plugin before 4.2.1 does not sanitise and escape some of its settings, leading to malicious users with administrator privileges to store malicious Javascript code leading to Cross-Site Scripting attacks when unfiltered_html is disallowed (for example in multisite setup)
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
MiniOrange WordPress Security | <4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1028 is a vulnerability in the WordPress Security Firewall, Malware Scanner, Secure Login and Backup plugin before version 4.2.1.
CVE-2022-1028 has a severity rating of 4.8, which is considered medium.
CVE-2022-1028 affects the WordPress Security Firewall, Malware Scanner, Secure Login and Backup plugin before version 4.2.1 by allowing malicious users with administrator privileges to store and execute malicious JavaScript code.
The vulnerability in CVE-2022-1028 can be exploited through Cross-Site Scripting attacks when unfiltered_html is not properly sanitized and escaped by the plugin.
To fix CVE-2022-1028, it is recommended to update the WordPress Security Firewall, Malware Scanner, Secure Login and Backup plugin to version 4.2.1 or later.