CVE-2022-4524

A vulnerability, which was classified as problematic, was found in Roots soil Plugin up to 4.0.x. Affected is the function language_attributes of the file src/Modules/CleanUpModule.php. The manipulation of the argument language leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 4.1.0 is able to address this issue. The name of the patch is 0c9151e00ab047da253e5cdbfccb204dd423269d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215904.
Configurations

Configuration 1 (hide)

cpe:2.3:a:roots:soil:*:*:*:*:*:wordpress:*:*

History

01 Mar 2023, 02:36

Type Values Removed Values Added
References (MISC) https://github.com/roots/soil/releases/tag/4.1.0 - (MISC) https://github.com/roots/soil/releases/tag/4.1.0 - Release Notes

24 Dec 2022, 22:15

Type Values Removed Values Added
References
  • {'url': 'https://github.com/roots/soil/releases/tag/4.1.1', 'name': 'N/A', 'tags': ['Release Notes', 'Third Party Advisory'], 'refsource': 'N/A'}
  • (MISC) https://github.com/roots/soil/releases/tag/4.1.0 -
CWE CWE-707
CWE-74
Summary A vulnerability, which was classified as problematic, was found in Roots soil Plugin up to 4.1.0. Affected is the function language_attributes of the file src/Modules/CleanUpModule.php. The manipulation of the argument language leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 4.1.1 is able to address this issue. The name of the patch is 0c9151e00ab047da253e5cdbfccb204dd423269d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215904. A vulnerability, which was classified as problematic, was found in Roots soil Plugin up to 4.0.x. Affected is the function language_attributes of the file src/Modules/CleanUpModule.php. The manipulation of the argument language leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 4.1.0 is able to address this issue. The name of the patch is 0c9151e00ab047da253e5cdbfccb204dd423269d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215904.

21 Dec 2022, 13:27

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CPE cpe:2.3:a:roots:soil:*:*:*:*:*:wordpress:*:*
References (N/A) https://vuldb.com/?id.215904 - (N/A) https://vuldb.com/?id.215904 - Third Party Advisory
References (N/A) https://github.com/roots/soil/releases/tag/4.1.1 - (N/A) https://github.com/roots/soil/releases/tag/4.1.1 - Release Notes, Third Party Advisory
References (N/A) https://github.com/roots/soil/pull/285 - (N/A) https://github.com/roots/soil/pull/285 - Patch, Third Party Advisory
References (N/A) https://github.com/roots/soil/commit/0c9151e00ab047da253e5cdbfccb204dd423269d - (N/A) https://github.com/roots/soil/commit/0c9151e00ab047da253e5cdbfccb204dd423269d - Patch, Third Party Advisory

15 Dec 2022, 22:06

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-15 21:15

Updated : 2024-05-17 02:16


NVD link : CVE-2022-4524

Mitre link : CVE-2022-4524

CVE.ORG link : CVE-2022-4524


JSON object : View

Products Affected

roots

  • soil
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')