
Cloud Vulnerability DB
A community-led vulnerabilities database
The Progressive License WordPress plugin versions up to 1.1.0 contains a Cross-Site Request Forgery (CSRF) vulnerability that can lead to Stored Cross-Site Scripting (XSS). The vulnerability was discovered and reported by Daniel Ruf on July 7, 2022, and was assigned CVE-2022-2171 with a CVSS score of 6.1 (medium) (WPScan).
The vulnerability stems from two main issues: First, the plugin lacks CSRF protection when saving its settings, which allows attackers to manipulate admin settings through forged requests. Second, the plugin permits arbitrary HTML insertion in one of its settings fields, leading to a Stored XSS vulnerability that can be triggered on the frontend (WPScan).
When exploited, this vulnerability could allow attackers to make unauthorized changes to plugin settings through CSRF attacks and inject malicious JavaScript code that would execute when users visit affected pages. The stored XSS component means that the injected code persists and affects all visitors to the compromised pages (WPScan).
As of the vulnerability disclosure, there is no known fix available for this issue. Users of the Progressive License plugin version 1.1.0 or below should consider either removing the plugin or implementing additional security measures at the web application level to prevent CSRF and XSS attacks (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."