Description
WordPress is prone to multiple vulnerabilities, including cross-site scripting, SQL injection and PHP object injection vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials, to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database, or to possibly execute arbitrary PHP code within the context of the affected webserver process. WordPress versions 4.6.x ranging from 4.6 and up to (and including) 4.6.21 are vulnerable.
Remediation
Update to WordPress version 4.6.22 or latest
References
https://blog.sonarsource.com/wordpress-stored-xss-vulnerability
https://www.wordfence.com/blog/2022/01/wordpress-5-8-3-security-release/
https://www.zerodayinitiative.com/advisories/ZDI-22-020/
https://www.exploit-db.com/exploits/50663
https://wordpress.org/support/wordpress-version/version-4.6.22/
Related Vulnerabilities
WordPress Plugin Fetch Tweets Unspecified Vulnerability (1.3.3.6)
WordPress Plugin Easy Google Map Cross-Site Scripting (1.1.4)
WordPress Plugin Advertizer 'id' Parameter SQL Injection (1.0)
WordPress Plugin Nmedia MailChimp Widget 'abs_path' Parameter Remote File Include (3.1)
WordPress Plugin WP Maintenance Mode Cross-Site Request Forgery (1.8.7)