First published: Tue Dec 20 2022(Updated: )
The Sidebar Widgets by CodeLights plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Extra CSS class’ parameter in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Codelights-shortcodes-and-widgets Project Codelights-shortcodes-and-widgets | <=1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Sidebar Widgets by CodeLights plugin is CVE-2022-4619.
The severity of CVE-2022-4619 is medium with a CVSS score of 4.8.
The vulnerability occurs due to insufficient input sanitization and output escaping in the 'Extra CSS class' parameter.
Authenticated attackers with administrative privileges can exploit the vulnerability.
Yes, you can update to a version of the Sidebar Widgets by CodeLights plugin that is higher than 1.4 to fix CVE-2022-4619.