2024-10-16 08:03:22 +00:00
{
"id" : "CVE-2022-4973" ,
"sourceIdentifier" : "security@wordfence.com" ,
"published" : "2024-10-16T07:15:12.497" ,
2024-10-30 17:03:21 +00:00
"lastModified" : "2024-10-30T15:58:30.907" ,
"vulnStatus" : "Analyzed" ,
2024-10-16 08:03:22 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page."
2024-10-16 18:03:24 +00:00
} ,
{
"lang" : "es" ,
"value" : "WordPress Core, en versiones hasta la 6.0.2, es vulnerable a cross-site scripting almacenado autenticados que pueden ser explotadas por usuarios con acceso al editor de publicaciones y p\u00e1ginas de WordPress, que generalmente consisten en autores, colaboradores y editores, lo que hace posible inyectar secuencias de comandos web arbitrarias en publicaciones y p\u00e1ginas que se ejecutan si se llama a la funci\u00f3n the_meta(); en esa p\u00e1gina."
2024-10-16 08:03:22 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-12-08 03:06:42 +00:00
"source" : "security@wordfence.com" ,
"type" : "Secondary" ,
2024-10-30 17:03:21 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" ,
"baseScore" : 4.9 ,
"baseSeverity" : "MEDIUM" ,
2024-10-30 17:03:21 +00:00
"attackVector" : "NETWORK" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "HIGH" ,
2024-10-30 17:03:21 +00:00
"privilegesRequired" : "LOW" ,
2024-12-08 03:06:42 +00:00
"userInteraction" : "NONE" ,
2024-10-30 17:03:21 +00:00
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-10-30 17:03:21 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 1.8 ,
2024-10-30 17:03:21 +00:00
"impactScore" : 2.7
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-10-16 08:03:22 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" ,
"baseScore" : 5.4 ,
"baseSeverity" : "MEDIUM" ,
2024-10-16 08:03:22 +00:00
"attackVector" : "NETWORK" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "LOW" ,
2024-10-16 08:03:22 +00:00
"privilegesRequired" : "LOW" ,
2024-12-08 03:06:42 +00:00
"userInteraction" : "REQUIRED" ,
2024-10-16 08:03:22 +00:00
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2024-10-16 08:03:22 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 2.3 ,
2024-10-16 08:03:22 +00:00
"impactScore" : 2.7
}
]
} ,
"weaknesses" : [
{
"source" : "security@wordfence.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
2024-10-30 17:03:21 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "6.0.2" ,
"matchCriteriaId" : "A54B0FB0-4E00-4D19-A948-394A668C9312"
}
]
}
]
}
] ,
2024-10-16 08:03:22 +00:00
"references" : [
{
"url" : "https://core.trac.wordpress.org/changeset/53961" ,
2024-10-30 17:03:21 +00:00
"source" : "security@wordfence.com" ,
"tags" : [
"Patch"
]
2024-10-16 08:03:22 +00:00
} ,
{
"url" : "https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/" ,
2024-10-30 17:03:21 +00:00
"source" : "security@wordfence.com" ,
"tags" : [
"Release Notes"
]
2024-10-16 08:03:22 +00:00
} ,
{
"url" : "https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/" ,
2024-10-30 17:03:21 +00:00
"source" : "security@wordfence.com" ,
"tags" : [
"Third Party Advisory"
]
2024-10-16 08:03:22 +00:00
} ,
{
"url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve" ,
2024-10-30 17:03:21 +00:00
"source" : "security@wordfence.com" ,
"tags" : [
"Third Party Advisory"
]
2024-10-16 08:03:22 +00:00
}
]
}