First published: Wed Sep 21 2022(Updated: )
Multiple Authenticated (custom specific plugin role) Persistent Cross-Site Scripting (XSS) vulnerability in Awesome Support plugin <= 6.0.7 at WordPress.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Awesome Support | <=6.0.7 |
Update to 6.0.8 or higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-38073.
The severity of CVE-2022-38073 is medium with a CVSS score of 5.4.
The Awesome Support plugin versions up to and including 6.0.7 for WordPress are affected by CVE-2022-38073.
To fix CVE-2022-38073, update the Awesome Support plugin to a version higher than 6.0.7.
You can find more information about CVE-2022-38073 at the following references: [Reference 1](https://patchstack.com/database/vulnerability/awesome-support/wordpress-awesome-support-plugin-6-0-7-multiple-authenticated-stored-cross-site-scripting-xss-vulnerabilities) and [Reference 2](https://wordpress.org/plugins/awesome-support/#developers).