First published: Mon Jun 13 2022(Updated: )
The Google Tag Manager for WordPress (GTM4WP) plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the `gtm4wp-options[scroller-contentid]` parameter found in the `~/public/frontend.php` file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Tag Manager | <1.15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-1961.
The severity of CVE-2022-1961 is medium with a severity value of 5.5.
The affected software is the Google Tag Manager for WordPress (GTM4WP) plugin version up to 1.15.2.
CVE-2022-1961 exploits a stored cross-site scripting vulnerability in the 'gtm4wp-options[scroller-contentid]' parameter of the 'frontend.php' file, allowing attackers with administrative user access to inject arbitrary code.
Yes, users should update to the latest version of the Google Tag Manager for WordPress (GTM4WP) plugin to fix CVE-2022-1961.