The User Registration, Login & Landing Pages WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the loader_text parameter found in the ~/includes/templates/landing-page.php file which allows attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.2.7. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
Metrics
Affected Vendors & Products
References
History
Fri, 31 Jan 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-01-31T18:55:33.845Z
Reserved: 2022-01-14T00:00:00.000Z
Link: CVE-2022-0232

Updated: 2024-08-02T23:18:42.953Z

Status : Modified
Published: 2022-01-18T17:15:10.447
Modified: 2024-11-21T06:38:11.747
Link: CVE-2022-0232

No data.