First published: Mon Sep 19 2022(Updated: )
The Gettext override translations WordPress plugin before 2.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
gettext | <2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3036 is classified as a medium severity vulnerability due to its potential for stored cross-site scripting attacks.
To fix CVE-2022-3036, update the Gettext override translations WordPress plugin to version 2.0.0 or later.
CVE-2022-3036 affects high privilege users, such as administrators, using versions of the Gettext override translations plugin before 2.0.0.
CVE-2022-3036 can allow attackers to perform stored cross-site scripting (XSS) attacks.
Yes, CVE-2022-3036 is a vulnerability in the Gettext override translations plugin for WordPress.