vulnerability
WordPress Plugin: wp-user-avatar: CVE-2022-4697: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:M/C:P/I:P/A:N) | Dec 23, 2022 | May 15, 2025 | Apr 29, 2026 |
Severity
5
CVSS
(AV:N/AC:L/Au:M/C:P/I:P/A:N)
Published
Dec 23, 2022
Added
May 15, 2025
Modified
Apr 29, 2026
Description
The ProfilePress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘wp_user_cover_default_image_url’ parameter in versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Solution
wp-user-avatar-plugin-cve-2022-4697
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.