2022-11-03 10:00:32 +00:00
{
2022-11-28 14:00:37 +00:00
"data_version" : "4.0" ,
2022-11-03 10:00:32 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2022-3847" ,
2022-11-28 14:00:37 +00:00
"ASSIGNER" : "contact@wpscan.com" ,
"STATE" : "PUBLIC"
2022-11-03 10:00:32 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2022-11-28 14:00:37 +00:00
"value" : "The Showing URL in QR Code WordPress plugin through 0.0.1 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin or editor add Stored XSS payloads via a CSRF attack"
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
} ,
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-79 Cross-Site Scripting (XSS)"
}
]
2022-11-03 10:00:32 +00:00
}
]
2022-11-28 14:00:37 +00:00
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Unknown" ,
"product" : {
"product_data" : [
{
"product_name" : "Showing URL in QR Code" ,
"version" : {
"version_data" : [
{
"version_value" : "0" ,
"version_affected" : "="
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://wpscan.com/vulnerability/a70ad549-2e09-44fb-b894-4271ad4a84f6" ,
"refsource" : "MISC" ,
"name" : "https://wpscan.com/vulnerability/a70ad549-2e09-44fb-b894-4271ad4a84f6"
2022-12-02 12:00:38 +00:00
} ,
{
"url" : "https://bulletin.iese.de/post/get-site-to-phone-by-qr-code_0-0-1/" ,
"refsource" : "MISC" ,
"name" : "https://bulletin.iese.de/post/get-site-to-phone-by-qr-code_0-0-1/"
2022-11-28 14:00:37 +00:00
}
]
} ,
"generator" : {
"engine" : "WPScan CVE Generator"
} ,
"source" : {
"discovery" : "EXTERNAL"
} ,
"credits" : [
{
"lang" : "en" ,
"value" : "Kunal Sharma (University of Kaiserslautern)"
} ,
{
"lang" : "en" ,
"value" : "Daniel Krohmer (Fraunhofer IESE)"
}
]
2022-11-03 10:00:32 +00:00
}