First published: Mon Jan 16 2023(Updated: )
The Seriously Simple Podcasting WordPress plugin before 2.19.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Seriously Simple Podcasting | <2.19.1 | |
<2.19.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-4571 is medium with a CVSS score of 5.4.
The affected software for CVE-2022-4571 is the Seriously Simple Podcasting WordPress plugin version up to 2.19.1.
The CWE ID for CVE-2022-4571 is CWE-79.
An attacker can exploit CVE-2022-4571 by performing Stored Cross-Site Scripting attacks using unvalidated and unescaped shortcode attributes in the Seriously Simple Podcasting plugin.
To fix CVE-2022-4571, update the Seriously Simple Podcasting WordPress plugin to version 2.19.1 or later.