Font Awesome 4 Menus <= 4.7.0 - Admin+ Stored XSS
CVE-2022-3829
Key Information:
- Vendor
- Wordpress
- Status
- Vendor
- CVE Published:
- 16 January 2024
Badges
Summary
The Font Awesome 4 Menus WordPress plugin through version 4.7.0 contains a vulnerability that fails to properly sanitize and escape certain settings. This oversight can permit users with elevated privileges, such as administrators, to execute Stored Cross-Site Scripting attacks. Even in situations where the 'unfiltered_html' capability is disabled, like in multisite configurations, this flaw poses a significant threat to WordPress installations. Proper validation and sanitization mechanisms are necessary to mitigate the associated risks.
Affected Version(s)
Font Awesome 4 Menus 0 <= 4.7.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved