CVE-2022-28221
CleanTalk AntiSpam <= 5.173 Reflected XSS
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The CleanTalk AntiSpam plugin <= 5.173 for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) via the $_REQUEST['page'] parameter in`/lib/Cleantalk/ApbctWP/FindSpam/ListTable/Comments.php`
El plugin CleanTalk AntiSpam versiones anteriores a 5.173 incluyéndola para WordPress, es vulnerable a un ataque de tipo Cross-Site Scripting Reflejado (XSS) por medio del parámetro $_REQUEST["page"] en "/lib/Cleantalk/ApbctWP/FindSpam/ListTable/Comments.php"
The CleanTalk AntiSpam plugin <= 5.173 for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) via the $_REQUEST['page'] parameter found in the /lib/Cleantalk/ApbctWP/FindSpam/ListTable/Comments.php file.
WordPress CleanTalk plugin versions 5.173 and below suffer from multiple cross site scripting vulnerabilities.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2022-03-30 CVE Reserved
- 2022-03-30 CVE Published
- 2022-03-30 First Exploit
- 2025-01-02 EPSS Updated
- 2025-02-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (2)
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cleantalk Search vendor "Cleantalk" | Antispam Search vendor "Cleantalk" for product "Antispam" | <= 5.173 Search vendor "Cleantalk" for product "Antispam" and version " <= 5.173" | wordpress |
Affected
|