
Cloud Vulnerability DB
A community-led vulnerabilities database
The WordPress plugin Chained Quiz version 1.3.2 and earlier contains multiple vulnerabilities identified as CVE-2022-4217. The vulnerability was discovered and disclosed on December 2, 2022, with a CVSS score of 5.5 (Medium). The issue affects authenticated users with administrative privileges due to insufficient input sanitization and output escaping (Wordfence).
The vulnerability stems from improper input sanitization where sanitizetextfield is used instead of the more appropriate esc_attr function. Multiple endpoints in the plugin are vulnerable, including files such as chained-quiz/controllers/completed.php and chained-quiz/views/completed.html.php. The CVSS vector for this vulnerability is CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N (Wordfence).
When exploited, the vulnerability allows authenticated attackers with administrative privileges to perform cross-site scripting (XSS) attacks. These attacks could potentially be used to add new administrative users to the website or execute arbitrary code when an administrator visits a specially crafted URL (Github Gist).
Users should update their WordPress Chained Quiz plugin to a version newer than 1.3.2 which contains the necessary security fixes. A standard system update will implement all the required changes to address the vulnerability (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."