First published: Fri Mar 25 2022(Updated: )
Multiple Authenticated Persistent Cross-Site Scripting (XSS) vulnerabilities in Simple Event Planner WordPress plugin <= 1.5.4 allows user with author or higher user rights inject the malicious code via vulnerable parameters: &custom[event_organiser], &custom[organiser_email], &custom[organiser_contact].
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Presstigers Simple Event Planner | <=1.5.4 |
Update to 1.5.5 or higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25612 is a vulnerability that refers to Multiple Authenticated Persistent Cross-Site Scripting (XSS) vulnerabilities in the Simple Event Planner WordPress plugin <= 1.5.4.
The severity of CVE-2022-25612 is medium with a CVSSv3 score of 5.4.
The Simple Event Planner WordPress plugin version 1.5.4 and earlier is affected by CVE-2022-25612.
An attacker with author or higher user rights can exploit CVE-2022-25612 by injecting malicious code through vulnerable parameters such as &custom[event_organiser], &custom[organiser_email], &custom[organiser_cont].
Yes, patches and fixes for CVE-2022-25612 are available. You can find them at the following references: [Patchstack](https://patchstack.com/database/vulnerability/simple-event-planner/wordpress-simple-event-planner-plugin-1-5-4-multiple-authenticated-persistent-cross-site-scripting-xss-vulnerabilities) and the [WordPress Plugin Page](https://wordpress.org/plugins/simple-event-planner/#developers).