CVE-2022-50961
Stored XSS in IP2Location Country Blocker WordPress Plugin
Publication date: 2026-05-10
Last updated on: 2026-05-10
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ip2location | country_blocker | to 2.26.7 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how the stored cross-site scripting vulnerability in the IP2Location Country Blocker plugin directly impacts compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
The WordPress Plugin IP2Location Country Blocker version 2.26.7 contains a stored cross-site scripting (XSS) vulnerability. This flaw allows authenticated users to inject arbitrary JavaScript code through the Frontend Settings interface, specifically via the URL field in the Display page settings.
When administrators or other authenticated users visit the plugin settings page, the injected malicious scripts execute, potentially leading to unauthorized actions or data theft.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers who have authenticated access to inject malicious JavaScript code that executes when administrators or other authenticated users access the plugin settings page.
The execution of these scripts can lead to unauthorized actions within the WordPress environment or theft of sensitive data, compromising the security and integrity of your website.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves stored cross-site scripting (XSS) through the URL field in the Display page settings of the IP2Location Country Blocker plugin. Detection involves checking for malicious JavaScript code injected in this specific plugin setting.
Since the vulnerability requires authenticated access to the WordPress admin area and specifically the plugin's Frontend Settings interface, detection can be done by reviewing the URL field in the Display page settings for suspicious or unexpected JavaScript code.
There are no specific network commands provided in the available resources to detect this vulnerability automatically.
A manual approach would be to log in to the WordPress admin panel, navigate to the IP2Location Country Blocker plugin settings, and inspect the URL field in the Display page settings for any injected scripts.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this stored XSS vulnerability, the immediate step is to update the IP2Location Country Blocker plugin to a version later than 2.26.7 where the vulnerability is fixed.
If an update is not immediately available, restrict access to the plugin settings page to trusted administrators only and avoid visiting the plugin settings page until the issue is resolved.
Additionally, review and sanitize the URL field in the Display page settings to remove any injected malicious scripts.
Consider disabling or limiting authenticated user permissions to prevent unauthorized users from injecting scripts via the plugin interface.