CVE-2022-1763
CVSS V2 Low 3.5
CVSS V3 Medium 5.4
Description
Due to missing checks the Static Page eXtended WordPress plugin through 2.1 is vulnerable to CSRF attacks which allows changing the plugin settings, including required user levels for specific features. This could also lead to Stored Cross-Site Scripting due to the lack of escaping in some of the settings
Overview
- CVE ID
- CVE-2022-1763
- Assigner
- contact@wpscan.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-06-13T13:15:12
- Last Modified Date
- 2022-06-21T18:26:35
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:static_page_extended_project:static_page_extended:*:*:*:*:*:wordpress:*:* | 1 | OR | 2.1 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:S/C:N/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- SINGLE
- Confidentiality Impact
- NONE
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 3.5
- Severity
- LOW
- Exploitability Score
- 6.8
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- REQUIRED
- Scope
- CHANGED
- Confidentiality Impact
- LOW
- Availability Impact
- NONE
- Base Score
- 5.4
- Base Severity
- MEDIUM
- Exploitability Score
- 2.3
- Impact Score
- 2.7
References
Reference URL | Reference Tags |
---|---|
https://wpscan.com/vulnerability/bd3aff73-078a-4e5a-b9e3-1604851c6df8 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-1763 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1763 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-06-13 14:00:09 | Added to TrackCVE |