Описание
The Google Tag Manager for WordPress plugin for WordPress is vulnerable to reflected Cross-Site Scripting via the s parameter due to the site search populating into the data layer of sites with insufficient sanitization in versions up to an including 1.15. The affected file is ~/public/frontend.php and this could be exploited by unauthenticated attackers.
The Google Tag Manager for WordPress plugin for WordPress is vulnerable to reflected Cross-Site Scripting via the s parameter due to the site search populating into the data layer of sites with insufficient sanitization in versions up to an including 1.15. The affected file is ~/public/frontend.php and this could be exploited by unauthenticated attackers.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2022-1707
- https://github.com/duracelltomi/gtm4wp/issues/224
- https://github.com/duracelltomi/gtm4wp/blob/1.15/public/frontend.php#L298
- https://github.com/duracelltomi/gtm4wp/blob/1.15/public/frontend.php#L782
- https://www.wordfence.com/threat-intel/vulnerabilities/id/0435ae14-c1fd-4611-acbe-5f3bafd4bb6a?source=cve
- https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1707
Связанные уязвимости
The Google Tag Manager for WordPress plugin for WordPress is vulnerable to reflected Cross-Site Scripting via the s parameter due to the site search populating into the data layer of sites with insufficient sanitization in versions up to an including 1.15. The affected file is ~/public/frontend.php and this could be exploited by unauthenticated attackers.