Vulnerability Description
The WP RSS Aggregator WordPress plugin before 4.20 does not sanitise and escape the id parameter in the wprss_fetch_items_row_action AJAX action before outputting it back in the response, leading to a Reflected Cross-Site Scripting
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wprssaggregator | Wp Rss Aggregator | < 4.20 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/2659298Release NotesThird Party Advisory
- https://wpscan.com/vulnerability/52a71bf1-b8bc-479e-b741-eb8fb9685014ExploitThird Party Advisory
- https://plugins.trac.wordpress.org/changeset/2659298Release NotesThird Party Advisory
- https://wpscan.com/vulnerability/52a71bf1-b8bc-479e-b741-eb8fb9685014ExploitThird Party Advisory
FAQ
What is CVE-2022-0189?
CVE-2022-0189 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The WP RSS Aggregator WordPress plugin before 4.20 does not sanitise and escape the id parameter in the wprss_fetch_items_row_action AJAX action before outputting it back in the response, leading to a...
How severe is CVE-2022-0189?
CVE-2022-0189 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0189?
Check the references section above for vendor advisories and patch information. Affected products include: Wprssaggregator Wp Rss Aggregator.