CVE-2022-2941
MEDIUMWp-useronline < 2.88.1 - XSS
Title source: ruleDescription
The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in versions up to, and including 2.88.0. This is due to the fact that all fields in the "Naming Conventions" section do not properly sanitize user input, nor escape it on output. This makes it possible for authenticated attackers, with administrative privileges, to inject JavaScript code into the setting that will execute whenever a user accesses the injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by UnD3sc0n0c1d0 · textwebappsphp
https://www.exploit-db.com/exploits/51020
References (5)
Scores
CVSS v3
5.5
EPSS
0.0537
EPSS Percentile
90.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (2)
gamerz/WP-UserOnline
< 2.88.0
wp-useronline_project/wp-useronline
< 2.88.1
Published
Sep 06, 2022
Tracked Since
Feb 18, 2026