
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-1557 affects the ULeak Security & Monitoring WordPress plugin through version 1.2.3. The vulnerability was discovered and publicly disclosed on April 2, 2022, and was last updated on May 4, 2022. This security issue impacts the plugin's settings functionality, specifically affecting WordPress installations using the vulnerable versions of the uleak-security-dashboard plugin (WPScan).
The vulnerability stems from the lack of proper authorization and CSRF checks when updating plugin settings, combined with insufficient sanitization and escaping mechanisms. The security issue has been classified as a Stored Cross-Site Scripting (XSS) vulnerability with a CVSS score of 8.0 (high severity). It is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation) and falls under the OWASP Top 10 category A7: Cross-Site Scripting (WPScan).
The vulnerability allows any authenticated user, including those with low-privilege roles such as subscriber, to perform Stored Cross-Site Scripting attacks against administrators who view the plugin settings. This could potentially lead to the execution of malicious JavaScript code in the context of an administrator's session (WPScan).
As of the last update, there is no known fix available for this vulnerability. Website administrators using the affected plugin should consider either removing the plugin or implementing additional security controls to restrict access to the plugin's settings (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."