First published: Mon Jan 02 2023(Updated: )
The Team Members WordPress plugin before 5.2.1 does not sanitize and escapes some of its settings, which could allow high-privilege users such as editors to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in a multisite setup).
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wpdarko Team Members | <5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-3936.
The affected software is the Team Members WordPress plugin before version 5.2.1.
The severity of CVE-2022-3936 is medium with a CVSS v3.1 base score of 4.8.
The type of vulnerability in CVE-2022-3936 is Stored Cross-Site Scripting (XSS).
The vulnerability can be exploited by high-privilege users such as editors to perform Stored Cross-Site Scripting attacks, even when the unfiltered_html capability is disallowed.