The ULeak Security & Monitoring WordPress plugin through 1.2.3 does not have authorisation and CSRF checks when updating its settings, and is also lacking sanitisation as well as escaping in some of them, which could allow any authenticated users such as subscriber to perform Stored Cross-Site Scripting attacks against admins viewing the settings
References
Link Resource
https://packetstormsecurity.com/files/166564/ Exploit Third Party Advisory VDB Entry
https://wpscan.com/vulnerability/e2b6dbf5-8709-4a2c-90be-3214ff55ed56 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: WPScan

Published: 2022-05-16T14:31:11

Updated: 2022-05-16T14:31:11

Reserved: 2022-05-03T00:00:00


Link: CVE-2022-1557

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-05-16T15:15:10.030

Modified: 2022-05-25T01:44:21.957


Link: CVE-2022-1557

JSON object: View

cve-icon Redhat Information

No data.

CWE