First published: Mon Nov 14 2022(Updated: )
The WP Attachments WordPress plugin before 5.0.5 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wp Attachments Project Wp Attachments | <5.0.5 | |
Marcomilesi Wp Attachments | <5.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3469 is a vulnerability in the WP Attachments WordPress plugin before version 5.0.5 that allows high-privilege users to perform Stored Cross-Site Scripting attacks.
This vulnerability can be exploited by a high-privilege user, such as an admin, by manipulating certain settings in the WP Attachments plugin.
CVE-2022-3469 has a severity value of 4.8, which is classified as medium.
The WP Attachments plugin before version 5.0.5 is affected by CVE-2022-3469.
Yes, upgrading to version 5.0.5 of the WP Attachments plugin will fix the vulnerability.