
Cloud Vulnerability DB
A community-led vulnerabilities database
A cross-site scripting (XSS) vulnerability was discovered in Roots soil Plugin versions up to 4.0.x. The vulnerability affects the language_attributes function in the src/Modules/CleanUpModule.php file, where improper handling of the language parameter could lead to XSS attacks. The issue was assigned CVE-2022-4524 and was publicly disclosed on December 15, 2022 (NVD).
The vulnerability exists in the language_attributes function where the get_bloginfo('language') output was not properly escaped before being used in HTML attributes. This could allow manipulation of the language parameter to inject malicious scripts. The vulnerability has a CVSS v3.1 base score of 6.1 (MEDIUM) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N (NVD).
If exploited, this vulnerability could allow attackers to execute arbitrary JavaScript code in the context of other users' browsers who visit the affected pages. This could potentially lead to theft of sensitive information, session hijacking, or other client-side attacks (NVD).
The vulnerability was fixed in version 4.1.0 of the Roots soil Plugin. The fix involves properly escaping the language attribute value using esc_attr() function. Users are strongly recommended to upgrade to version 4.1.0 or later to address this security issue (GitHub Release, GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."