Vulnerability Description
The Favicon by RealFaviconGenerator WordPress plugin before 1.3.23 does not properly sanitise and escape the json_result_url parameter before outputting it back in the Favicon admin dashboard, leading to a Reflected Cross-Site Scripting issue
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realfavicongenerator | Favicon By Realfavicongenerator | < 1.3.23 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/2695862PatchThird Party Advisory
- https://wpscan.com/vulnerability/499bfee4-b481-4276-b6ad-0eead6680f66ExploitPatchThird Party Advisory
- https://plugins.trac.wordpress.org/changeset/2695862PatchThird Party Advisory
- https://wpscan.com/vulnerability/499bfee4-b481-4276-b6ad-0eead6680f66ExploitPatchThird Party Advisory
FAQ
What is CVE-2022-0471?
CVE-2022-0471 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The Favicon by RealFaviconGenerator WordPress plugin before 1.3.23 does not properly sanitise and escape the json_result_url parameter before outputting it back in the Favicon admin dashboard, leading...
How severe is CVE-2022-0471?
CVE-2022-0471 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0471?
Check the references section above for vendor advisories and patch information. Affected products include: Realfavicongenerator Favicon By Realfavicongenerator.