CVE-2022-50961
Received Received - Intake
Stored XSS in IP2Location Country Blocker WordPress Plugin

Publication date: 2026-05-10

Last updated on: 2026-05-10

Assigner: VulnCheck

Description
WordPress Plugin IP2Location Country Blocker 2.26.7 contains a stored cross-site scripting vulnerability that allows authenticated users to inject arbitrary JavaScript code through the Frontend Settings interface. Attackers can inject malicious scripts in the URL field of the Display page settings that execute when administrators or other authenticated users visit the plugin settings page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-10
Last Modified
2026-05-10
Generated
2026-05-10
AI Q&A
2026-05-10
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ip2location country_blocker to 2.26.7 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how the stored cross-site scripting vulnerability in the IP2Location Country Blocker plugin directly impacts compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

The WordPress Plugin IP2Location Country Blocker version 2.26.7 contains a stored cross-site scripting (XSS) vulnerability. This flaw allows authenticated users to inject arbitrary JavaScript code through the Frontend Settings interface, specifically via the URL field in the Display page settings.

When administrators or other authenticated users visit the plugin settings page, the injected malicious scripts execute, potentially leading to unauthorized actions or data theft.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers who have authenticated access to inject malicious JavaScript code that executes when administrators or other authenticated users access the plugin settings page.

The execution of these scripts can lead to unauthorized actions within the WordPress environment or theft of sensitive data, compromising the security and integrity of your website.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves stored cross-site scripting (XSS) through the URL field in the Display page settings of the IP2Location Country Blocker plugin. Detection involves checking for malicious JavaScript code injected in this specific plugin setting.

Since the vulnerability requires authenticated access to the WordPress admin area and specifically the plugin's Frontend Settings interface, detection can be done by reviewing the URL field in the Display page settings for suspicious or unexpected JavaScript code.

There are no specific network commands provided in the available resources to detect this vulnerability automatically.

A manual approach would be to log in to the WordPress admin panel, navigate to the IP2Location Country Blocker plugin settings, and inspect the URL field in the Display page settings for any injected scripts.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this stored XSS vulnerability, the immediate step is to update the IP2Location Country Blocker plugin to a version later than 2.26.7 where the vulnerability is fixed.

If an update is not immediately available, restrict access to the plugin settings page to trusted administrators only and avoid visiting the plugin settings page until the issue is resolved.

Additionally, review and sanitize the URL field in the Display page settings to remove any injected malicious scripts.

Consider disabling or limiting authenticated user permissions to prevent unauthorized users from injecting scripts via the plugin interface.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart