// For flags

CVE-2022-1568

Team Members < 5.1.1 - Admin+ Stored Cross-Site Scripting

Time Line
Published
2024-03-19
Updated
2024-03-19
Firt exploit
2024-03-19
Overview
Descriptions (2)
NVD, NVD
CWE (1)
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC (-)
Risk
CVSS Score
4.8 Medium
SSVC
-
KEV
-
EPSS
0.1%
Affected Products (-)
Vendors (1)
wpdarko
Products (1)
team_members
Versions (1)
< 5.1.1
Intel Resources (-)
Advisories (-)
-
Exploits (-)
-
Plugins (-)
-
References (1)
General (-)
Exploits & POcs (1)
wpscan
Patches (-)
Advisories (-)
Summary
Descriptions

The Team Members WordPress plugin before 5.1.1 does not escape some of its Team settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed

El plugin Team Members de WordPress versiones anteriores a 5.1.1, no escapa de algunas de sus configuraciones de Equipo, lo que podría permitir a usuarios con altos privilegios, como los administradores, llevar a cabo ataques de tipo Cross-Site Scripting incluso cuando unfiltered_html está deshabilitado

*Credits: lucy
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-05-04 CVE Reserved
  • 2022-05-09 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Threat Intelligence Resources (0)
Security Advisory details:

Select an advisory to view details here.

Select an exploit to view details here.

Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Wpdarko
Search vendor "Wpdarko"
Team Members
Search vendor "Wpdarko" for product "Team Members"
< 5.1.1
Search vendor "Wpdarko" for product "Team Members" and version " < 5.1.1"
wordpress
Affected