CVE-2022-1961: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in duracelltomi GTM4WP
The Google Tag Manager for WordPress (GTM4WP) plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the `gtm4wp-options[scroller-contentid]` parameter found in the `~/public/frontend.php` file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
AI Analysis
Technical Summary
CVE-2022-1961 is a medium severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Google Tag Manager for WordPress (GTM4WP) plugin developed by duracelltomi. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Specifically, the plugin fails to sufficiently escape the `gtm4wp-options[scroller-contentid]` parameter in the `~/public/frontend.php` file. This flaw allows an attacker with administrative privileges on a WordPress site to inject arbitrary JavaScript code that is stored and later executed in the context of users visiting the site. The vulnerability affects all versions up to and including 1.15.1 and is particularly relevant in multi-site WordPress installations or sites where the `unfiltered_html` capability is disabled for administrators, limiting their ability to insert raw HTML. The CVSS v3.1 base score is 5.5 (medium), reflecting that the attack requires high privileges (administrative access) but no user interaction, and can impact confidentiality and integrity by enabling script injection and potential session hijacking or privilege escalation within the site. No known exploits are reported in the wild as of the publication date. The vulnerability’s scope is limited to sites using the GTM4WP plugin with the affected versions and configurations, but given WordPress’s widespread use in Europe, the risk is non-negligible for organizations relying on this plugin for tag management and analytics integration.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized script execution within their WordPress sites, potentially compromising user data confidentiality and site integrity. Attackers with administrative access could leverage this flaw to inject malicious scripts that steal session cookies, perform actions on behalf of users, or deface websites. This can damage organizational reputation, lead to data breaches, and disrupt business operations. Since many European organizations use WordPress for corporate websites, e-commerce, and communication portals, exploitation could affect customer trust and regulatory compliance, especially under GDPR where data breaches must be reported. Multi-site WordPress installations, common in large enterprises and educational institutions, are particularly at risk. The vulnerability does not directly affect availability but could indirectly cause downtime if remediation or incident response is required.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the GTM4WP plugin to a version later than 1.15.1 where the issue is fixed. If an update is not immediately possible, administrators should restrict administrative access strictly to trusted personnel and review user roles to minimize the number of users with high privileges. Additionally, implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injection attempts targeting the vulnerable parameter can reduce risk. Regular security audits and monitoring of plugin activity logs for unusual behavior are recommended. For multi-site installations, ensure that the `unfiltered_html` capability is carefully managed and consider additional input validation or sanitization plugins to complement the default WordPress security. Finally, organizations should educate administrators about the risks of stored XSS and safe plugin management practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-1961: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in duracelltomi GTM4WP
Description
The Google Tag Manager for WordPress (GTM4WP) plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the `gtm4wp-options[scroller-contentid]` parameter found in the `~/public/frontend.php` file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
AI-Powered Analysis
Technical Analysis
CVE-2022-1961 is a medium severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Google Tag Manager for WordPress (GTM4WP) plugin developed by duracelltomi. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Specifically, the plugin fails to sufficiently escape the `gtm4wp-options[scroller-contentid]` parameter in the `~/public/frontend.php` file. This flaw allows an attacker with administrative privileges on a WordPress site to inject arbitrary JavaScript code that is stored and later executed in the context of users visiting the site. The vulnerability affects all versions up to and including 1.15.1 and is particularly relevant in multi-site WordPress installations or sites where the `unfiltered_html` capability is disabled for administrators, limiting their ability to insert raw HTML. The CVSS v3.1 base score is 5.5 (medium), reflecting that the attack requires high privileges (administrative access) but no user interaction, and can impact confidentiality and integrity by enabling script injection and potential session hijacking or privilege escalation within the site. No known exploits are reported in the wild as of the publication date. The vulnerability’s scope is limited to sites using the GTM4WP plugin with the affected versions and configurations, but given WordPress’s widespread use in Europe, the risk is non-negligible for organizations relying on this plugin for tag management and analytics integration.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized script execution within their WordPress sites, potentially compromising user data confidentiality and site integrity. Attackers with administrative access could leverage this flaw to inject malicious scripts that steal session cookies, perform actions on behalf of users, or deface websites. This can damage organizational reputation, lead to data breaches, and disrupt business operations. Since many European organizations use WordPress for corporate websites, e-commerce, and communication portals, exploitation could affect customer trust and regulatory compliance, especially under GDPR where data breaches must be reported. Multi-site WordPress installations, common in large enterprises and educational institutions, are particularly at risk. The vulnerability does not directly affect availability but could indirectly cause downtime if remediation or incident response is required.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the GTM4WP plugin to a version later than 1.15.1 where the issue is fixed. If an update is not immediately possible, administrators should restrict administrative access strictly to trusted personnel and review user roles to minimize the number of users with high privileges. Additionally, implementing a Web Application Firewall (WAF) with rules to detect and block suspicious script injection attempts targeting the vulnerable parameter can reduce risk. Regular security audits and monitoring of plugin activity logs for unusual behavior are recommended. For multi-site installations, ensure that the `unfiltered_html` capability is carefully managed and consider additional input validation or sanitization plugins to complement the default WordPress security. Finally, organizations should educate administrators about the risks of stored XSS and safe plugin management practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2022-05-31T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbcf6
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 10:56:50 PM
Last updated: 7/26/2025, 4:52:40 PM
Views: 11
Related Threats
CVE-2025-20048: Escalation of Privilege in Intel(R) Trace Analyzer and Collector software
MediumCVE-2025-20037: Escalation of Privilege in Intel(R) Converged Security and Management Engine
MediumCVE-2025-20025: Denial of Service in TinyCBOR libraries maintained by Intel(R)
MediumCVE-2025-20023: Escalation of Privilege in Intel(R) Graphics Driver software installers
MediumCVE-2025-20017: Escalation of Privilege in Intel(R) oneAPI Toolkit and component software installers
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.