6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
55.9%
WordPress Elementor Website Builder plugin 3.5.5 and prior contains a reflected cross-site scripting vulnerability via the document object model.
id: CVE-2022-29455
info:
name: WordPress Elementor Website Builder <= 3.5.5 - DOM Cross-Site Scripting
author: rotembar,daffainfo
severity: medium
description: |
WordPress Elementor Website Builder plugin 3.5.5 and prior contains a reflected cross-site scripting vulnerability via the document object model.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
Upgrade WordPress Elementor Website Builder to version 3.5.6 or later to mitigate this vulnerability.
reference:
- https://rotem-bar.com/hacking-65-million-websites-greater-cve-2022-29455-elementor
- https://www.rotem-bar.com/elementor
- https://patchstack.com/database/vulnerability/elementor/wordpress-elementor-plugin-3-5-5-unauthenticated-dom-based-reflected-cross-site-scripting-xss-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2022-29455
- https://wordpress.org/plugins/elementor/#developers
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-29455
cwe-id: CWE-79
epss-score: 0.0019
epss-percentile: 0.56534
cpe: cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 1
vendor: elementor
product: website_builder
framework: wordpress
tags: cve,cve2022,xss,wordpress,elementor
http:
- method: GET
path:
- '{{BaseURL}}/wp-content/plugins/elementor/readme.txt'
matchers-condition: and
matchers:
- type: dsl
dsl:
- compare_versions(version, '<= 3.5.5')
- type: word
part: body
words:
- 'Elementor Website Builder'
- type: status
status:
- 200
extractors:
- type: regex
name: version
group: 1
regex:
- "(?m)Stable tag: ([0-9.]+)"
internal: true
- type: regex
group: 1
regex:
- "(?m)Stable tag: ([0-9.]+)"
# digest: 4a0a004730450220132dd18822d4be6e55b83dc3418190c6b99196da5fe45f1cb6830726664d2f5a022100b9c8cb73aa892d6d0e8a18f869dc632c2795411bb3c62c508306024a87fb2fb9:922c64590222798bb761d5b6d8e72950
nvd.nist.gov/vuln/detail/CVE-2022-29455
patchstack.com/database/vulnerability/elementor/wordpress-elementor-plugin-3-5-5-unauthenticated-dom-based-reflected-cross-site-scripting-xss-vulnerability
rotem-bar.com/hacking-65-million-websites-greater-cve-2022-29455-elementor
wordpress.org/plugins/elementor/#developers
www.rotem-bar.com/elementor
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.002 Low
EPSS
Percentile
55.9%