CVE-2022-4243

The ImageInject WordPress plugin through 1.17 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpscoop:imageinject:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:34

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/fc1fc057-97ee-4a10-909f-2f11eafa0bd0 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/fc1fc057-97ee-4a10-909f-2f11eafa0bd0 - Exploit, Third Party Advisory
Summary
  • (es) El complemento ImageInject de WordPress hasta la versión 1.17 no sanitiza ni escapa a algunas de sus configuraciones, lo que podría permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting (XSS) Almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo, en una configuración multisitio).

Information

Published : 2022-12-26 13:15

Updated : 2025-04-12 00:15


NVD link : CVE-2022-4243

Mitre link : CVE-2022-4243

CVE.ORG link : CVE-2022-4243


JSON object : View

Products Affected

wpscoop

  • imageinject
CWE

No CWE.