2024-05-19 02:03:31 +00:00

69 lines
2.3 KiB
JSON

{
"id": "CVE-2022-4196",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-01-09T23:15:27.417",
"lastModified": "2023-11-07T03:57:09.073",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The Multi Step Form WordPress plugin before 1.7.8 does not sanitise and escape some of its form fields, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
},
{
"lang": "es",
"value": "El complemento Multi Step Form de WordPress anterior a 1.7.8 no sanitiza ni escapa algunos de sus campos de formulario, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en multisitio). configuraci\u00f3n)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mondula:multi_step_form:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.8",
"matchCriteriaId": "9234D5D1-616F-481A-A1A5-7957AFD95A43"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/dfbc61ef-3fe4-4bab-904a-480b073d4e88",
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}