Reflected Cross-Site Scripting in Chained Quiz Plugin for WordPress
CVE-2022-4211
6.1MEDIUM
Summary
The Chained Quiz plugin for WordPress has a vulnerability that allows unauthenticated attackers to exploit insufficient input sanitization in the 'emailf' parameter on the 'chainedquiz_list' page. By crafting a malicious link, an attacker can trick users into clicking it, which results in the execution of arbitrary web scripts on their browsers. This can lead to significant security risks, including data theft or malicious site interactions, emphasizing the importance of keeping plugins updated and employing stringent security practices.
Affected Version(s)
Chained Quiz * <= 1.3.2
References
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Muhammad Zeeshan (Xib3rR4dAr)