Vulnerability Description
The Login Logout Menu WordPress plugin before 1.4.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wpbrigade | Login Logout Menu | < 1.4.0 |
References
- https://wpscan.com/vulnerability/cd6657d5-810c-4d0c-8bbf-1f8d4a2d8d15ExploitThird Party Advisory
- https://wpscan.com/vulnerability/cd6657d5-810c-4d0c-8bbf-1f8d4a2d8d15ExploitThird Party Advisory
FAQ
What is CVE-2022-4625?
CVE-2022-4625 is a vulnerability with a CVSS score of 5.4 (MEDIUM). The Login Logout Menu WordPress plugin before 1.4.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as...
How severe is CVE-2022-4625?
CVE-2022-4625 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-4625?
Check the references section above for vendor advisories and patch information. Affected products include: Wpbrigade Login Logout Menu.