Lucene search

K
cve[email protected]CVE-2022-2072
HistoryJul 25, 2022 - 1:15 p.m.

CVE-2022-2072

2022-07-2513:15:08
CWE-79
web.nvd.nist.gov
37
name directory
wordpress plugin
cve-2022-2072
reflected xss
stored xss
security vulnerability

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

34.1%

The Name Directory WordPress plugin before 1.25.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting. Furthermore, as the payload is also saved into the database after the request, it leads to a Stored XSS as well

Affected configurations

Vulners
NVD
Node
name_directory_projectname_directoryRange<1.25.3
VendorProductVersionCPE
name_directory_projectname_directory*cpe:2.3:a:name_directory_project:name_directory:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Name Directory",
    "vendor": "Unknown",
    "versions": [
      {
        "lessThan": "1.25.3",
        "status": "affected",
        "version": "1.25.3",
        "versionType": "custom"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

34.1%