Lucene search

K
cveWPScanCVE-2022-3610
HistoryNov 28, 2022 - 2:15 p.m.

CVE-2022-3610

2022-11-2814:15:13
WPScan
web.nvd.nist.gov
39
6
cve-2022-3610
jeeng
push notifications
wordpress
plugin
stored xss
security vulnerability

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

24.8%

The Jeeng Push Notifications WordPress plugin before 2.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

Affected configurations

Nvd
Vulners
Node
jeeng_push_notifications_projectjeeng_push_notificationsRange<2.0.4wordpress
VendorProductVersionCPE
jeeng_push_notifications_projectjeeng_push_notifications*cpe:2.3:a:jeeng_push_notifications_project:jeeng_push_notifications:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "Jeeng Push Notifications",
    "collectionURL": "https://wordpress.org/plugins",
    "versions": [
      {
        "status": "affected",
        "versionType": "custom",
        "version": "0",
        "lessThan": "2.0.4"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

Social References

More

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

24.8%