First published: Mon Jul 25 2022(Updated: )
The Name Directory WordPress plugin before 1.25.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting. Furthermore, as the payload is also saved into the database after the request, it leads to a Stored XSS as well
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Name Directory Project Name Directory | <1.25.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2072 is a vulnerability in the Name Directory WordPress plugin before version 1.25.3 that allows for Reflected Cross-Site Scripting and Stored XSS attacks.
If you are using the Name Directory WordPress plugin before version 1.25.3, you are at risk of having your website compromised through Reflected Cross-Site Scripting and Stored XSS attacks.
CVE-2022-2072 has a severity score of 6.1, which is categorized as medium.
To fix CVE-2022-2072, update your Name Directory WordPress plugin to version 1.25.3 or later, which includes the necessary sanitization and escaping of parameters.
You can find more information about CVE-2022-2072 at the following reference link: [CVE-2022-2072](https://wpscan.com/vulnerability/3014540c-21b3-481c-83a1-ce3017151af4).