The Google Tag Manager for WordPress plugin for WordPress is vulnerable to reflected Cross-Site Scripting via the s parameter due to the site search populating into the data layer of sites with insufficient sanitization in versions up to an including 1.15. The affected file is ~/public/frontend.php and this could be exploited by unauthenticated attackers.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 05 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-05-05T16:41:32.912Z
Reserved: 2022-05-13T00:00:00.000Z
Link: CVE-2022-1707
Updated: 2024-08-03T00:10:03.914Z
Status : Modified
Published: 2022-06-13T13:15:11.793
Modified: 2025-05-05T17:17:35.523
Link: CVE-2022-1707
No data.
OpenCVE Enrichment
No data.
Weaknesses