First published: Fri Mar 25 2022(Updated: )
Authenticated Stored Cross-Site Scripting (XSS) in Simple Event Planner plugin <= 1.5.4 allows attackers with contributor or higher user roles to inject the malicious script by using vulnerable parameter &custom[add_seg][].
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Presstigers Simple Event Planner | <=1.5.4 |
Update to 1.5.5 or higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25611 is an Authenticated Stored Cross-Site Scripting (XSS) vulnerability found in the Simple Event Planner plugin version 1.5.4 and below.
CVE-2022-25611 allows attackers with contributor or higher user roles to inject malicious scripts into the plugin, potentially leading to unauthorized actions or data theft.
CVE-2022-25611 has a severity score of 5.4, which is considered medium.
To fix CVE-2022-25611, update the Simple Event Planner plugin to version 1.5.5 or higher, which contains a patch for the vulnerability.
For more information about CVE-2022-25611, you can refer to the following resources: [Patchstack](https://patchstack.com/database/vulnerability/simple-event-planner/wordpress-simple-event-planner-plugin-1-5-4-authenticated-stored-cross-site-scripting-xss-vulnerability) and [WordPress Plugin Directory](https://wordpress.org/plugins/simple-event-planner/#developers).