First published: Thu Jan 06 2022(Updated: )
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Low-privileged authenticated users (like author) in WordPress core are able to execute JavaScript/perform stored XSS attack, which can affect high-privileged users. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wordpress | 5.0.15+dfsg1-0+deb10u1 5.0.19+dfsg1-0+deb10u1 5.7.8+dfsg1-0+deb11u2 6.1.1+dfsg1-1 6.3.1+dfsg1-1 | |
WordPress WordPress | <5.8.3 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
<5.8.3 | ||
=9.0 | ||
=10.0 | ||
=11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21662 is a vulnerability in WordPress that allows low-privileged authenticated users to perform stored XSS attacks, potentially impacting high-privileged users.
CVE-2022-21662 affects WordPress by allowing low-privileged authenticated users to execute JavaScript and perform stored XSS attacks.
The severity of CVE-2022-21662 is rated as high.
WordPress versions up to and excluding 5.8.3 are affected by CVE-2022-21662.
To fix CVE-2022-21662, update WordPress to version 5.8.3 or newer.