First published: Mon Jun 27 2022(Updated: )
The Limit Login Attempts WordPress plugin before 4.0.72 does not sanitise and escape some of its settings, leading to malicious users with administrator privileges to store malicious Javascript code leading to Cross-Site Scripting attacks when unfiltered_html is disallowed (for example in multisite setup)
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
MiniOrange Limit Login Attempts | <4.0.72 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Limit Login Attempts WordPress plugin is CVE-2022-1029.
The severity of CVE-2022-1029 is medium with a CVSS score of 4.8.
The Limit Login Attempts WordPress plugin version up to 4.0.72 is affected by CVE-2022-1029.
The CWE category of CVE-2022-1029 is CWE-79 (Cross-Site Scripting).
To fix CVE-2022-1029, update the Limit Login Attempts WordPress plugin to version 4.0.72 or above.