Description
The Google Tag Manager for WordPress plugin for WordPress is vulnerable to reflected Cross-Site Scripting via the s parameter due to the site search populating into the data layer of sites with insufficient sanitization in versions up to an including 1.15. The affected file is ~/public/frontend.php and this could be exploited by unauthenticated attackers.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Wed, 08 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Google Tag Manager for WordPress <= 1.15 - Reflected Cross-Site Scripting via Site Search |
Mon, 05 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:33:07.016Z
Reserved: 2022-05-13T00:00:00.000Z
Link: CVE-2022-1707
Updated: 2024-08-03T00:10:03.914Z
Status : Modified
Published: 2022-06-13T13:15:11.793
Modified: 2026-04-08T17:16:43.277
Link: CVE-2022-1707
No data.
OpenCVE Enrichment
No data.
Weaknesses