The Google Tag Manager for WordPress (GTM4WP) plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the `gtm4wp-options[scroller-contentid]` parameter found in the `~/public/frontend.php` file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2022-06-13T13:11:47
Updated: 2023-10-20T15:06:03.592Z
Reserved: 2022-05-31T00:00:00
Link: CVE-2022-1961
JSON object: View
NVD Information
Status : Modified
Published: 2022-06-13T14:15:08.843
Modified: 2023-11-07T03:42:21.023
Link: CVE-2022-1961
JSON object: View
Redhat Information
No data.
CWE