First published: Fri Dec 23 2022(Updated: )
The ProfilePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several form fields in versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Properfraction Profilepress | <4.5.1 | |
<4.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-4698.
The severity of CVE-2022-4698 is medium.
The affected software of CVE-2022-4698 is the ProfilePress plugin for WordPress up to and including version 4.5.0.
CVE-2022-4698 allows authenticated attackers with administrator-level permissions to execute Stored Cross-Site Scripting attacks via several form fields in the ProfilePress plugin.
Yes, you can find references for CVE-2022-4698 at the following URLs: [Reference 1](https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2838522%40wp-user-avatar%2Ftrunk&old=2837217%40wp-user-avatar%2Ftrunk&sfp_email=&sfph_mail=), [Reference 2](https://www.wordfence.com/threat-intel/vulnerabilities/id/43c9dcec-f769-4c55-93d0-c2aa45a4fa16).