Vulnerability Description
The Amelia WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the lastName parameter found in the ~/src/Application/Controller/User/Customer/AddCustomerController.php file which allows attackers to inject arbitrary web scripts onto a pages that executes whenever a user accesses the booking calendar with the date the attacker has injected the malicious payload into. This affects versions up to and including 1.0.46.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wpamelia | Amelia | <= 1.0.46 |
Related Weaknesses (CWE)
References
- https://www.wordfence.com/threat-intel/vulnerabilities/id/73f12f22-c0a4-4010-963
- https://www.wordfence.com/vulnerability-advisories/#CVE-2022-0834Third Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/73f12f22-c0a4-4010-963
- https://www.wordfence.com/vulnerability-advisories/#CVE-2022-0834Third Party Advisory
FAQ
What is CVE-2022-0834?
CVE-2022-0834 is a vulnerability with a CVSS score of 7.2 (HIGH). The Amelia WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the lastName parameter found in the ~/src/Application/Controller/User/Customer/AddCus...
How severe is CVE-2022-0834?
CVE-2022-0834 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0834?
Check the references section above for vendor advisories and patch information. Affected products include: Wpamelia Amelia.