|
|||
Rule General Information |
---|
Release Date: | 2022-06-28 | |
Rule Name: | WordPress Plugin Google Tag Manager Cross Site Scripting Vulnerability (CVE-2022-1707) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | The Google Tag Manager for WordPress plugin for WordPress is vulnerable to reflected Cross-Site Scripting via the s parameter due to the site search populating into the data layer of sites with insufficient sanitization in versions up to an including 1.15. The affected file is ~/public/frontend.php and this could be exploited by unauthenticated attackers. | |
Impact: | An attacker can conduct a cross-site scripting attack to inject malicious client-side scripts into web pages viewed by other users, or to bypass access controls such as the same-origin policy, if affected version is installed. | |
Affected OS: | Windows, Others | |
Reference: | https://github.com/duracelltomi/gtm4wp/blob/1.15/public/frontend.php#L298 https://github.com/duracelltomi/gtm4wp/blob/1.15/public/frontend.php#L782 https://github.com/duracelltomi/gtm4wp/issues/224 https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1707 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1707 |