First published: Mon Jun 13 2022(Updated: )
The Google Tag Manager for WordPress plugin for WordPress is vulnerable to reflected Cross-Site Scripting via the s parameter due to the site search populating into the data layer of sites with insufficient sanitization in versions up to an including 1.15. The affected file is ~/public/frontend.php and this could be exploited by unauthenticated attackers.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Tag Manager | <=1.15 | |
Google Tag Manager | <1.15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1707 is a vulnerability in the Google Tag Manager for WordPress plugin for WordPress, which allows for reflected Cross-Site Scripting (XSS) attacks.
The vulnerability occurs due to insufficient sanitization of the 's' parameter in the site search, which populates into the data layer.
CVE-2022-1707 has a severity rating of 6.1 (medium).
Versions up to and including 1.15, and up to but excluding 1.15.1, of the Google Tag Manager for WordPress plugin are affected by CVE-2022-1707.
To fix CVE-2022-1707, update the Google Tag Manager for WordPress plugin to version 1.15.1 or later.