First published: Mon Dec 05 2022(Updated: )
The WP OAuth Server (OAuth Authentication) WordPress plugin before 4.2.2 does not sanitize and escape Client IDs, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP OAuth Server | <4.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3892 is a vulnerability in the WP OAuth Server (OAuth Authentication) WordPress plugin that allows high privilege users to perform Stored Cross-Site Scripting attacks.
CVE-2022-3892 has a severity level of medium, with a severity value of 4.8 out of 10.
CVE-2022-3892 affects the WP OAuth Server plugin before version 4.2.2 by not sanitizing and escaping Client IDs, which can lead to Stored Cross-Site Scripting attacks.
The vulnerability in the WP OAuth Server plugin can be exploited by high privilege users, such as admins, to perform Stored Cross-Site Scripting attacks.
To fix CVE-2022-3892, update the WP OAuth Server plugin to version 4.2.2 or higher, which includes the necessary sanitization and escaping of Client IDs.