First published: Mon Jan 30 2023(Updated: )
The MediaElement.js WordPress plugin through 4.2.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high-privilege users such as admins.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mediaelement.js | <=4.2.8 | |
MediaElement.js | <=4.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4699 is a vulnerability in the MediaElement.js WordPress plugin through version 4.2.8 that allows stored cross-site scripting attacks.
CVE-2022-4699 has a severity rating of medium, with a CVSS score of 5.4.
The MediaElement.js WordPress plugin version 4.2.8 and below are affected by CVE-2022-4699.
To fix CVE-2022-4699, update the MediaElement.js WordPress plugin to a version higher than 4.2.8.
For more information about CVE-2022-4699, you can visit the reference link: https://wpscan.com/vulnerability/e57f38d9-889a-4f82-b20d-3676ccf9c6f9