Lucene search

K
cvelistVulDBCVELIST:CVE-2022-4631
HistoryDec 21, 2022 - 12:00 a.m.

CVE-2022-4631 WP-Ban ban-options.php cross site scripting

2022-12-2100:00:00
CWE-707
VulDB
www.cve.org
cross site scripting
wp-ban
ban-options.php
remote attack
vulnerability
cve-2022-4631

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

25.4%

A vulnerability, which was classified as problematic, was found in WP-Ban. Affected is an unknown function of the file ban-options.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 22b925449c84faa9b7496abe4f8f5661cb5eb3bf. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216480.

CNA Affected

[
  {
    "vendor": "unspecified",
    "product": "WP-Ban",
    "versions": [
      {
        "version": "n/a",
        "status": "affected"
      }
    ]
  }
]

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

25.4%

Related for CVELIST:CVE-2022-4631