CVE-2022-2941

The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in versions up to, and including 2.88.0. This is due to the fact that all fields in the "Naming Conventions" section do not properly sanitize user input, nor escape it on output. This makes it possible for authenticated attackers, with administrative privileges, to inject JavaScript code into the setting that will execute whenever a user accesses the injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wp-useronline_project:wp-useronline:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 4.8
v2 : unknown
v3 : 5.5
References () https://github.com/lesterchan/wp-useronline/commit/59c76b20e4e27489f93dee4ef1254d6204e08b3c - Patch () https://github.com/lesterchan/wp-useronline/commit/59c76b20e4e27489f93dee4ef1254d6204e08b3c - Patch
References () https://packetstormsecurity.com/files/168479/wpuseronline2880-xss.txt - Exploit, Third Party Advisory, VDB Entry () https://packetstormsecurity.com/files/168479/wpuseronline2880-xss.txt - Exploit, Third Party Advisory, VDB Entry
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2770235%40wp-useronline&new=2770235%40wp-useronline&sfp_email=&sfph_mail= - Patch () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2770235%40wp-useronline&new=2770235%40wp-useronline&sfp_email=&sfph_mail= - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/5c4fb14c-de6d-4247-8f83-050f1350f6a2?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/5c4fb14c-de6d-4247-8f83-050f1350f6a2?source=cve - Third Party Advisory
References () https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2941 - Third Party Advisory () https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2941 - Third Party Advisory

13 Sep 2022, 16:07

Type Values Removed Values Added
CPE cpe:2.3:a:wp-useronline_project:wp-useronline:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.8
References (MISC) https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2941 - (MISC) https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2941 - Third Party Advisory
References (MISC) https://github.com/lesterchan/wp-useronline/commit/59c76b20e4e27489f93dee4ef1254d6204e08b3c - (MISC) https://github.com/lesterchan/wp-useronline/commit/59c76b20e4e27489f93dee4ef1254d6204e08b3c - Patch, Third Party Advisory
References (MISC) https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2770235%40wp-useronline&new=2770235%40wp-useronline&sfp_email=&sfph_mail= - (MISC) https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2770235%40wp-useronline&new=2770235%40wp-useronline&sfp_email=&sfph_mail= - Patch, Third Party Advisory

06 Sep 2022, 18:50

Type Values Removed Values Added
New CVE

Information

Published : 2022-09-06 18:15

Updated : 2024-11-21 07:01


NVD link : CVE-2022-2941

Mitre link : CVE-2022-2941

CVE.ORG link : CVE-2022-2941


JSON object : View

Products Affected

wp-useronline_project

  • wp-useronline
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')