4.8
CVE-2022-4196
- EPSS 0.23%
- Veröffentlicht 09.01.2023 23:15:27
- Zuletzt bearbeitet 09.04.2025 14:15:26
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
Multi Step Form <= 1.7.7 - Authenticated (Administrator+) Stored Cross-Site Scripting
The Multi Step Form WordPress plugin before 1.7.8 does not sanitise and escape some of its form fields, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Mögliche Gegenmaßnahme
Multi Step Form: Update to version 1.7.8, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Multi Step Form
Version
*-1.7.7
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mondula ≫ Multi Step Form SwPlatformwordpress Version < 1.7.8
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.23% | 0.451 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 4.8 | 1.7 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 4.8 | 1.7 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
|