The Google Tag Manager for WordPress (GTM4WP) plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the `gtm4wp-options[scroller-contentid]` parameter found in the `~/public/frontend.php` file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
Metrics
Affected Vendors & Products
References
History
Mon, 05 May 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2022-06-13T13:11:47.000Z
Updated: 2025-05-05T16:40:29.109Z
Reserved: 2022-05-31T00:00:00.000Z
Link: CVE-2022-1961

Updated: 2024-08-03T00:24:44.045Z

Status : Modified
Published: 2022-06-13T14:15:08.843
Modified: 2025-05-05T17:17:36.797
Link: CVE-2022-1961

No data.