Vulnerability Description
The WP FullCalendar WordPress plugin before 1.5 does not ensure that the post retrieved via an AJAX action is public and can be accessed by the user making the request, allowing unauthenticated attackers to get the content of arbitrary posts, including draft/private as well as password-protected ones.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pixelite | Wp Fullcalendar | < 1.5 |
References
- https://wpscan.com/vulnerability/5a69965d-d243-4d51-b7a4-d6f4b199abf1ExploitThird Party Advisory
- https://wpscan.com/vulnerability/5a69965d-d243-4d51-b7a4-d6f4b199abf1ExploitThird Party Advisory
FAQ
What is CVE-2022-3891?
CVE-2022-3891 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The WP FullCalendar WordPress plugin before 1.5 does not ensure that the post retrieved via an AJAX action is public and can be accessed by the user making the request, allowing unauthenticated attack...
How severe is CVE-2022-3891?
CVE-2022-3891 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3891?
Check the references section above for vendor advisories and patch information. Affected products include: Pixelite Wp Fullcalendar.