First published: Wed Oct 16 2024(Updated: )
WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=6.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4973 has a high severity rating due to the potential for authenticated stored cross-site scripting (XSS) attacks.
To fix CVE-2022-4973, you should update your WordPress installation to version 6.0.3 or later.
CVE-2022-4973 affects users with access to the WordPress post and page editor, including Authors, Contributors, and Editors.
CVE-2022-4973 can be exploited through authenticated stored cross-site scripting (XSS), allowing attackers to inject arbitrary web scripts.
CVE-2022-4973 is found in WordPress versions up to 6.0.2.