First published: Mon Nov 21 2022(Updated: )
The Spacer WordPress plugin before 3.0.7 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Clevelandwebdeveloper Spacer | <3.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3618 is a vulnerability in the Spacer WordPress plugin before version 3.0.7 that allows high-privilege users to perform Stored Cross-Site Scripting attacks.
CVE-2022-3618 affects the Spacer WordPress plugin before version 3.0.7 by allowing high-privilege users, such as admin, to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
The severity of CVE-2022-3618 is medium with a CVSS score of 4.8.
To fix CVE-2022-3618, update the Spacer WordPress plugin to version 3.0.7 or higher.
The Common Weakness Enumeration (CWE) ID for CVE-2022-3618 is 79.