Vulnerability Description
The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a request that when submitted by any visitor will inject arbitrary html or javascript into the response that will be executed in the victims session. Note: This requires knowledge of a static secret key
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Servmask | All-In-One Wp Migration | < 7.63 |
References
- https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58ExploitThird Party Advisory
- https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58ExploitThird Party Advisory
FAQ
What is CVE-2022-2546?
CVE-2022-2546 is a vulnerability with a CVSS score of 4.7 (MEDIUM). The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a reque...
How severe is CVE-2022-2546?
CVE-2022-2546 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-2546?
Check the references section above for vendor advisories and patch information. Affected products include: Servmask All-In-One Wp Migration.