cvelist/2022/1xxx/CVE-2022-1763.json

75 lines
1.9 KiB
JSON
Raw Normal View History

2022-05-17 13:01:39 +00:00
{
2022-06-13 14:39:04 +02:00
"CVE_data_meta": {
"ID": "CVE-2022-1763",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC",
"TITLE": "Static Page eXtended <= 2.1 - Arbitrary Settings Update via CSRF to Stored XSS"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"generator": "WPScan CVE Generator",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Static Page eXtended",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "2.1",
"version_value": "2.1"
}
]
}
}
]
}
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Due to missing checks the Static Page eXtended WordPress plugin through 2.1 is vulnerable to CSRF attacks which allows changing the plugin settings, including required user levels for specific features. This could also lead to Stored Cross-Site Scripting due to the lack of escaping in some of the settings"
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://wpscan.com/vulnerability/bd3aff73-078a-4e5a-b9e3-1604851c6df8",
"name": "https://wpscan.com/vulnerability/bd3aff73-078a-4e5a-b9e3-1604851c6df8"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"value": "CWE-352 Cross-Site Request Forgery (CSRF)",
"lang": "eng"
}
2022-05-17 13:01:39 +00:00
]
2022-06-13 14:39:04 +02:00
}
]
},
"credit": [
{
"lang": "eng",
"value": "Daniel Ruf"
2022-05-17 13:01:39 +00:00
}
2022-06-13 14:39:04 +02:00
],
"source": {
"discovery": "EXTERNAL"
}
2022-05-17 13:01:39 +00:00
}