CVE-2022-4710
CVSS V2 None
CVSS V3 None
Description
The Royal Elementor Addons plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 1.3.59, due to due to insufficient input sanitization and output escaping of the 'wpr_ajax_search_link_target' parameter in the 'data_fetch' function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This is occurring because 'sanitize_text_field' is insufficient to prevent attribute-based Cross-Site Scripting
Overview
- CVE ID
- CVE-2022-4710
- Assigner
- security@wordfence.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-01-10T17:15:11
- Last Modified Date
- 2023-01-13T07:56:40
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.3.59 |
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-4710 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4710 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-10 17:18:15 | Added to TrackCVE | |||
2023-01-10 17:18:17 | Weakness Enumeration | new | ||
2023-01-10 18:20:26 | 2023-01-10T17:21:44 | CVE Modified Date | updated | |
2023-01-10 18:20:26 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-12 19:15:11 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-13 09:16:54 | 2023-01-13T07:56:40 | CVE Modified Date | updated | |
2023-01-13 09:16:54 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-13 09:16:58 | CPE Information | updated |