First published: Mon Jun 13 2022(Updated: )
The Zephyr Project Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘project’ parameter in versions up to, and including, 3.2.40 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dylan James Zephyr Project Manager | <3.2.41 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1822 has a medium severity rating due to its potential for causing reflected cross-site scripting attacks.
To resolve CVE-2022-1822, update the Zephyr Project Manager plugin to version 3.2.41 or later.
CVE-2022-1822 affects users of the Zephyr Project Manager plugin for WordPress, specifically versions up to and including 3.2.40.
CVE-2022-1822 allows unauthenticated attackers to perform reflected cross-site scripting attacks, potentially compromising user data.
CVE-2022-1822 is specifically related to the Zephyr Project Manager plugin and does not depend on the WordPress core version.