Логотип exploitDog
bind:CVE-2022-1001
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-1001

Количество 2

Количество 2

nvd логотип

CVE-2022-1001

почти 4 года назад

The WP Downgrade WordPress plugin before 1.2.3 only perform client side validation of its "WordPress Target Version" settings, but does not sanitise and escape it server side, allowing high privilege users such as admin to perform Cross-Site attacks even when the unfiltered_html capability is disallowed

CVSS3: 4.8
EPSS: Низкий
github логотип

GHSA-x9cg-qwvm-rg5j

почти 4 года назад

The WP Downgrade WordPress plugin before 1.2.3 only perform client side validation of its "WordPress Target Version" settings, but does not sanitise and escape it server side, allowing high privilege users such as admin to perform Cross-Site attacks even when the unfiltered_html capability is disallowed

CVSS3: 4.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-1001

The WP Downgrade WordPress plugin before 1.2.3 only perform client side validation of its "WordPress Target Version" settings, but does not sanitise and escape it server side, allowing high privilege users such as admin to perform Cross-Site attacks even when the unfiltered_html capability is disallowed

CVSS3: 4.8
0%
Низкий
почти 4 года назад
github логотип
GHSA-x9cg-qwvm-rg5j

The WP Downgrade WordPress plugin before 1.2.3 only perform client side validation of its "WordPress Target Version" settings, but does not sanitise and escape it server side, allowing high privilege users such as admin to perform Cross-Site attacks even when the unfiltered_html capability is disallowed

CVSS3: 4.8
0%
Низкий
почти 4 года назад

Уязвимостей на страницу