First published: Fri Dec 23 2022(Updated: )
The ProfilePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘wp_user_cover_default_image_url’ parameter in versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Properfraction Profilepress | <4.5.1 | |
<4.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4697 is a vulnerability in the ProfilePress plugin for WordPress that allows for Stored Cross-Site Scripting.
CVE-2022-4697 occurs due to insufficient input sanitization and output escaping in the 'wp_user_cover_default_image_url' parameter.
The severity of CVE-2022-4697 is medium with a CVSS score of 4.8.
Versions up to and including 4.5.0 of the ProfilePress plugin for WordPress are affected by CVE-2022-4697.
To fix CVE-2022-4697, it is recommended to update the ProfilePress plugin for WordPress to version 4.5.1 or higher.