Medium severity5.5NVD Advisory· Published Sep 6, 2022· Updated Apr 8, 2026
CVE-2022-2941
CVE-2022-2941
Description
The WP-UserOnline plugin for WordPress has multiple Stored Cross-Site Scripting vulnerabilities in versions up to, and including 2.88.0. This is due to the fact that all fields in the "Naming Conventions" section do not properly sanitize user input, nor escape it on output. This makes it possible for authenticated attackers, with administrative privileges, to inject JavaScript code into the setting that will execute whenever a user accesses the injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Affected products
1- cpe:2.3:a:wp-useronline_project:wp-useronline:*:*:*:*:*:wordpress:*:*Range: <2.88.1
Patches
159c76b20e4e2https://github.com/lesterchan/wp-useronlinevia nvd-ref
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/lesterchan/wp-useronline/commit/59c76b20e4e27489f93dee4ef1254d6204e08b3cnvdPatch
- plugins.trac.wordpress.org/changesetnvdPatch
- packetstormsecurity.com/files/168479/wpuseronline2880-xss.txtnvdExploitThird Party AdvisoryVDB Entry
- www.wordfence.com/threat-intel/vulnerabilities/id/5c4fb14c-de6d-4247-8f83-050f1350f6a2nvdThird Party Advisory
- www.wordfence.com/vulnerability-advisories/nvdThird Party Advisory
News mentions
0No linked articles in our index yet.