CVE-2022-38068
WordPress Export Post Info plugin <= 1.1.0 - Authenticated Stored Cross-Site Scripting (XSS) vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Apasionados Export Post Info plugin <= 1.1.0 at WordPress.
Una vulnerabilidad de tipo Cross-Site Scripting (XSS) Almacenado Autenticado (admin+) en el plugin Apasionados Export Post Info versiones anteriores a 1.1.0 incluyéndola, en WordPress
The Export Post Info plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘epi_random_string_filename’ parameter in versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in the post export page that will execute whenever a user accesses it.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-08-09 CVE Reserved
- 2022-09-07 CVE Published
- 2024-09-16 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (2)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apasionados Search vendor "Apasionados" | Export Post Info Search vendor "Apasionados" for product "Export Post Info" | <= 1.1.0 Search vendor "Apasionados" for product "Export Post Info" and version " <= 1.1.0" | wordpress |
Affected
|