94 lines
3.0 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-3149",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-10-17T12:15:10.340",
"lastModified": "2024-11-21T07:18:55.770",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "The WP Custom Cursors WordPress plugin before 3.0.1 does not have CSRF check in place when creating and editing cursors, which could allow attackers to made a logged in admin perform such actions via CSRF attacks. Furthermore, due to the lack of sanitisation and escaping in some of the cursor options, it could also lead to Stored Cross-Site Scripting"
},
{
"lang": "es",
"value": "El plugin WP Custom Cursors de WordPress versiones anteriores a 3.0.1, no presenta una comprobaci\u00f3n de tipo CSRF cuando se crean y editan cursores, lo que podr\u00eda permitir a atacantes hacer que un administrador conectado lleve a cabo dichas acciones por medio de ataques de tipo CSRF. Adem\u00e1s, debido a una falta de saneo y escape en algunas de las opciones del cursor, tambi\u00e9n podr\u00eda conllevar a un ataque de tipo Cross-Site Scripting Almacenado"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
2023-04-24 12:24:31 +02:00
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
2023-04-24 12:24:31 +02:00
"description": [
{
"lang": "en",
"value": "CWE-79"
2023-04-24 12:24:31 +02:00
},
{
"lang": "en",
"value": "CWE-352"
2023-04-24 12:24:31 +02:00
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp_custom_cursors_project:wp_custom_cursors:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.0.1",
"matchCriteriaId": "76D7B555-015B-41EE-B495-5D7E0EB6EDC9"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/4c13a93d-2100-4721-8937-a1205378655f",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/4c13a93d-2100-4721-8937-a1205378655f",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}