CVE-2022-1961

Google Tag Manager for WordPress (GTM4WP) <= 1.15.1 - Stored Cross-Site Scripting via Content Element ID

mediumImproper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
5.5
CVSS Score
5.5
CVSS Score
medium
Severity
1.15.2
Patched in
602d
Time to patch

Description

The Google Tag Manager for WordPress (GTM4WP) plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the `gtm4wp-options[scroller-contentid]` parameter found in the `~/public/frontend.php` file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Low
Confidentiality
Low
Integrity
None
Availability

Technical Details

Affected versions<=1.15.1
PublishedMay 31, 2022
Last updatedJanuary 22, 2024

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.