The Top 10 WordPress plugin before 3.2.3 does not validate and escape some of its Block attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
                
            References
                    | Link | Resource | 
|---|---|
| https://wpscan.com/vulnerability/a2483ecf-42a6-470a-b965-4e05069d1cef | Exploit Third Party Advisory | 
| https://wpscan.com/vulnerability/a2483ecf-42a6-470a-b965-4e05069d1cef | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:35
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-01-23 15:15
Updated : 2025-04-02 16:15
NVD link : CVE-2022-4570
Mitre link : CVE-2022-4570
CVE.ORG link : CVE-2022-4570
JSON object : View
Products Affected
                top_10_project
- top_10
CWE
                No CWE.
