CVE-2022-3139

The We’re Open! WordPress plugin before 1.42 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Configurations

Configuration 1 (hide)

cpe:2.3:a:designextreme:we\'re_open:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:18

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/11c89925-4fe9-45f7-9020-55fe7bbae3db - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/11c89925-4fe9-45f7-9020-55fe7bbae3db - Exploit, Third Party Advisory

22 Oct 2022, 23:10

Type Values Removed Values Added
CPE cpe:2.3:a:designextreme:we\'re_open:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.8
References (MISC) https://wpscan.com/vulnerability/11c89925-4fe9-45f7-9020-55fe7bbae3db - (MISC) https://wpscan.com/vulnerability/11c89925-4fe9-45f7-9020-55fe7bbae3db - Exploit, Third Party Advisory

17 Oct 2022, 12:49

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-17 12:15

Updated : 2024-11-21 07:18


NVD link : CVE-2022-3139

Mitre link : CVE-2022-3139

CVE.ORG link : CVE-2022-3139


JSON object : View

Products Affected

designextreme

  • we\'re_open
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')