RULE(RULE ID:336696)

Rule General Information
Release Date: 2022-06-28
Rule Name: WordPress Plugin Google Tag Manager Cross Site Scripting Vulnerability (CVE-2022-1707)
Severity:
CVE ID:
Rule Protection Details
Description: The Google Tag Manager for WordPress plugin for WordPress is vulnerable to reflected Cross-Site Scripting via the s parameter due to the site search populating into the data layer of sites with insufficient sanitization in versions up to an including 1.15. The affected file is ~/public/frontend.php and this could be exploited by unauthenticated attackers.
Impact: An attacker can conduct a cross-site scripting attack to inject malicious client-side scripts into web pages viewed by other users, or to bypass access controls such as the same-origin policy, if affected version is installed.
Affected OS: Windows, Others
Reference: https://github.com/duracelltomi/gtm4wp/blob/1.15/public/frontend.php#L298
https://github.com/duracelltomi/gtm4wp/blob/1.15/public/frontend.php#L782
https://github.com/duracelltomi/gtm4wp/issues/224
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1707
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1707