First published: Fri Dec 02 2022(Updated: )
The Chained Quiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'api_key' parameter in versions up to, and including, 1.3.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kibokolabs Chained Quiz Wordpress | <=1.3.2.2 | |
<=1.3.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4217 is a vulnerability in the Chained Quiz plugin for WordPress that allows authenticated attackers with administrative privileges to execute Stored Cross-Site Scripting attacks.
The vulnerability in the Chained Quiz plugin occurs due to insufficient input sanitization and output escaping in the 'api_key' parameter, allowing attackers to inject malicious scripts.
The severity of CVE-2022-4217 is rated as medium with a severity value of 4.8.
Versions up to, and including, 1.3.2.2 of the Chained Quiz plugin for WordPress are affected by CVE-2022-4217.
To fix the vulnerability in the Chained Quiz plugin, users should update to a version higher than 1.3.2.2, which includes the necessary input sanitization and output escaping.