CVE-2022-1756
Newsletter < 7.4.5 - Reflected Cross-Site Scripting
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Newsletter WordPress plugin before 7.4.5 does not sanitize and escape the $_SERVER['REQUEST_URI'] before echoing it back in admin pages. Although this uses addslashes, and most modern browsers automatically URLEncode requests, this is still vulnerable to Reflected XSS in older browsers such as Internet Explorer 9 or below.
El plugin Newsletter de WordPress versiones anteriores a 7.4.5, no sanea y escapa el $_SERVER["REQUEST_URI"] antes de devolverlo en las páginas de administración. Aunque esto usa addslashes, y la mayoría de los navegadores modernos automáticamente URLEncode peticiones, esto sigue siendo vulnerable a un ataque de tipo XSS Reflejado en los navegadores más antiguos como Internet Explorer 9 o anteriores
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-05-17 CVE Reserved
- 2022-05-23 CVE Published
- 2024-01-04 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://wpscan.com/vulnerability/6ad407fe-db2b-41fb-834b-dd8c4f62b072 | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Thenewsletterplugin Search vendor "Thenewsletterplugin" | Newsletter Search vendor "Thenewsletterplugin" for product "Newsletter" | < 7.4.5 Search vendor "Thenewsletterplugin" for product "Newsletter" and version " < 7.4.5" | wordpress |
Affected
|