First published: Mon Feb 06 2023(Updated: )
The Strong Testimonials WordPress plugin before 3.0.3 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPChill Strong Testimonials | <3.0.3 | |
<3.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Strong Testimonials WordPress plugin is CVE-2022-4717.
CVE-2022-4717 has a severity value of 5.4, which is considered medium.
The vulnerability in the Strong Testimonials WordPress plugin allows users with a role as low as contributor to perform Stored Cross-Site Scripting attacks.
The Strong Testimonials WordPress plugin version up to and excluding 3.0.3 is affected by CVE-2022-4717.
Yes, the fix for CVE-2022-4717 is to update the Strong Testimonials WordPress plugin to version 3.0.3 or later.