The Chained Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'emailf' parameter on the 'chainedquiz_list' page in versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Title Chained Quiz <= 1.3.2 - Reflected Cross-Site Scripting via emailf
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/A:N/I:L/C:L/S:C/UI:R/PR:N/AC:L/AV:N'}

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Fri, 31 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:58:14.401Z

Reserved: 2022-11-29T19:16:40.154Z

Link: CVE-2022-4211

cve-icon Vulnrichment

Updated: 2024-08-03T01:34:49.824Z

cve-icon NVD

Status : Modified

Published: 2022-12-02T21:15:11.470

Modified: 2026-04-08T18:17:32.773

Link: CVE-2022-4211

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.