{ "id": "CVE-2022-1967", "sourceIdentifier": "contact@wpscan.com", "published": "2022-07-04T13:15:08.797", "lastModified": "2022-07-12T18:32:38.183", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The WP Championship WordPress plugin before 9.3 is lacking CSRF checks in various places, allowing attackers to make a logged in admin perform unwanted actions, such as create and delete arbitrary teams as well as update the plugin's settings. Due to the lack of sanitisation and escaping, it could also lead to Stored Cross-Site Scripting issues" }, { "lang": "es", "value": "El plugin WP Championship de WordPress versiones anteriores a 9.3, carece de comprobaciones de tipo CSRF en varios lugares, lo que permite a atacantes hacer que un administrador con sesi\u00f3n iniciada lleve a cabo acciones no deseadas, como crear y eliminar equipos arbitrarios, as\u00ed como actualizar la configuraci\u00f3n del plugin. Debido a una falta de saneo y escape, tambi\u00e9n podr\u00eda conllevar a problemas de tipo Cross-Site Scripting Almacenado" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "contact@wpscan.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-352" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:wp-championship_project:wp-championship:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "9.3", "matchCriteriaId": "47A6DA9A-1BDA-47FE-9881-B018853AEB31" } ] } ] } ], "references": [ { "url": "https://wpscan.com/vulnerability/02d25736-c796-49bd-b774-66e0e3fcf4c9", "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ] } ] }