First published: Mon Jan 16 2023(Updated: )
The WP Attachments WordPress plugin before 5.0.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Credit: contact@wpscan.com contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wp Attachments Project Wp Attachments | <=5.0.5 | |
Marcomilesi Wp Attachments | <5.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-4330.
The severity of CVE-2022-4330 is medium with a severity value of 4.8.
The affected software for CVE-2022-4330 is the WP Attachments WordPress plugin before version 5.0.6.
The risk of CVE-2022-4330 is that high privilege users, such as admin, can perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
To fix CVE-2022-4330, update the WP Attachments WordPress plugin to version 5.0.6 or later.