First published: Mon Jan 16 2023(Updated: )
The Link Library WordPress plugin before 7.4.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Link Library WordPress | <7.4.1 | |
<7.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4199 has a medium severity rating due to its potential for stored Cross-Site Scripting attacks affecting high privilege users.
To fix CVE-2022-4199, update the Link Library WordPress plugin to version 7.4.1 or later.
CVE-2022-4199 affects users of the Link Library WordPress plugin prior to version 7.4.1, particularly those with high privilege roles like admin.
CVE-2022-4199 can allow stored Cross-Site Scripting (XSS) attacks due to improper sanitization and escaping of certain settings.
Yes, in a multisite setup, even with unfiltered_html capability disallowed, CVE-2022-4199 can still be exploited.