CVE-2022-3934

The FlatPM WordPress plugin before 3.0.13 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Configurations

Configuration 1 (hide)

cpe:2.3:a:mehanoid:flat_pm:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:20

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/ab68381f-c4b8-4945-a6a5-1d4d6473b73a - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/ab68381f-c4b8-4945-a6a5-1d4d6473b73a - Exploit, Third Party Advisory

27 Feb 2023, 10:15

Type Values Removed Values Added
Summary The Flat PM WordPress plugin through 2.661 does not sanitize and escapes some parameters, which could allow users with a role as low as Admin to perform Cross-Site Scripting attacks. The FlatPM WordPress plugin before 3.0.13 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin

14 Dec 2022, 21:23

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-12 18:15

Updated : 2025-04-22 15:16


NVD link : CVE-2022-3934

Mitre link : CVE-2022-3934

CVE.ORG link : CVE-2022-3934


JSON object : View

Products Affected

mehanoid

  • flat_pm
CWE

No CWE.