The Google Tag Manager for WordPress (GTM4WP) plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the `gtm4wp-options[scroller-contentid]` parameter found in the `~/public/frontend.php` file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2732977%40duracelltomi-google-tag-manager&new=2732977%40duracelltomi-google-tag-manager&sfp_email=&sfph_mail= | Patch Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1961 | Third Party Advisory |
https://gist.github.com/Xib3rR4dAr/02a21cd0ea0b7bf586131c5eebb69f1d | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-06-13 07:15
Updated : 2022-08-05 20:57
NVD link : CVE-2022-1961
Mitre link : CVE-2022-1961
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
gtm4wp
- google_tag_manager