CVE-2022-4467

Status: Modified
Last modified: 07-11-2023
Published: 23-01-2023
5.4

SUMMARY CVE-2022-4467

The Search & Filter WordPress plugin before 1.2.16 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin.

Access CVSS3 CVE-2022-4467

Attack Complexity Attack Vector Privileges Required Scope User Interaction
LOW NETWORK LOW CHANGED REQUIRED

Impact CVSS3 CVE-2022-4467

Confidentiality Integrity Availability
LOW LOW NONE

Details CVE-2022-4467

EPSS 0.00058
EPSS % 0.25499
References
CWE Unknown
Vulnerable Configurations
  • cpe:2.3:a:codeamp:search_\&_filter:1.0.0:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.0.0:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.0.1:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.0.1:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.0.2:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.0.2:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.0.3:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.0.3:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.1.0:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.1.0:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.1.1:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.1.1:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.1.2:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.1.2:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.1.3:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.1.3:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.0:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.0:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.1:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.1:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.2:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.2:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.3:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.3:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.4:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.4:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.5:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.5:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.6:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.6:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.7:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.7:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.8:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.8:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.9:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.9:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.10:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.10:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.11:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.11:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.12:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.12:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.13:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.13:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.14:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.14:*:*:*:*:wordpress:*:*
  • cpe:2.3:a:codeamp:search_\&_filter:1.2.15:*:*:*:*:wordpress:*:*
    cpe:2.3:a:codeamp:search_\&_filter:1.2.15:*:*:*:*:wordpress:*:*
CVSS3 Source nvd@nist.gov
CVSS3 Type Primary
CVSS3 Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

ATOM RSS Feed Link for CVE Vulnerabilities

CVE Data Propulsed by AKAOMA CyberSecurity