Vulnerability Description
The Bank Mellat WordPress plugin through 1.3.7 does not sanitize and escape the orderId parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bank Mellat Project | Bank Mellat | <= 1.3.7 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/5be0de93-9625-419a-8c37-521c1bd9c24cExploitThird Party Advisory
- https://wpscan.com/vulnerability/5be0de93-9625-419a-8c37-521c1bd9c24cExploitThird Party Advisory
FAQ
What is CVE-2022-0643?
CVE-2022-0643 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The Bank Mellat WordPress plugin through 1.3.7 does not sanitize and escape the orderId parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting.
How severe is CVE-2022-0643?
CVE-2022-0643 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0643?
Check the references section above for vendor advisories and patch information. Affected products include: Bank Mellat Project Bank Mellat.