Vulnerability CVE-2022-2941


Published: 2022-09-06

Description:
The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in versions up to, and including 2.88.0. This is due to the fact that all fields in the "Naming Conventions" section do not properly sanitize user input, nor escape it on output. This makes it possible for authenticated attackers, with administrative privileges, to inject JavaScript code into the setting that will execute whenever a user accesses the injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

See advisories in our WLB2 database:
Topic
Author
Date
Low
WordPress WP-UserOnline 2.88.0 Cross Site Scripting
UnD3sc0n0c1d0
25.09.2022
Low
WP-UserOnline 2.88.0 Stored Cross Site Scripting (XSS) (Authenticated)
Onur Göğebakan
08.08.2024

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

 References:
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2770235%40wp-useronline&new=2770235%40wp-useronline&sfp_email=&sfph_mail
=
https://github.com/lesterchan/wp-useronline/commit/59c76b20e4e27489f93dee4ef1254d6204e08b3c
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2941

Copyright 2024, cxsecurity.com

 

Back to Top