{ "id": "CVE-2022-33994", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-30T20:15:08.490", "lastModified": "2024-11-21T07:08:44.783", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Gutenberg plugin through 13.7.3 for WordPress allows stored XSS by the Contributor role via an SVG document to the \"Insert from URL\" feature. NOTE: the XSS payload does not execute in the context of the WordPress instance's domain; however, analogous attempts by low-privileged users to reference SVG documents are blocked by some similar products, and this behavioral difference might have security relevance to some WordPress site administrators." }, { "lang": "es", "value": "El plugin Gutenberg versiones hasta 13.7.3 para WordPress, permite un ataque de tipo XSS almacenado por el rol de Colaborador por medio de un documento SVG a la funcionalidad \"Insert from URL\". NOTA: la carga \u00fatil de tipo XSS no es ejecutada en el contexto del dominio de la instancia de WordPress; sin embargo, los intentos an\u00e1logos de usuarios poco privilegiados de hacer referencia a documentos SVG son bloqueados por algunos productos similares, y esta diferencia de comportamiento podr\u00eda tener relevancia de seguridad para algunos administradores de sitios de WordPress" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N", "baseScore": 3.0, "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 1.3, "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:gutenberg_project:gutenberg:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "13.7.3", "matchCriteriaId": "22DB944B-7AFF-4F23-8999-B2BBF1518F1E" } ] } ] } ], "references": [ { "url": "https://blog.jitendrapatro.me/cve-2022-33994-stored-xss-in-wordpress/", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://patchstack.com/articles/patchstack-weekly-svg-xss-reported-in-gutenberg/", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://blog.jitendrapatro.me/cve-2022-33994-stored-xss-in-wordpress/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] }, { "url": "https://patchstack.com/articles/patchstack-weekly-svg-xss-reported-in-gutenberg/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] } ] }