The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a request that when submitted by any visitor will inject arbitrary html or javascript into the response that will be executed in the victims session. Note: This requires knowledge of a static secret key
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58 | Exploit Third Party Advisory |
Configurations
History
07 Nov 2023, 03:46
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2023-02-02 09:15
Updated : 2024-02-28 19:51
NVD link : CVE-2022-2546
Mitre link : CVE-2022-2546
CVE.ORG link : CVE-2022-2546
JSON object : View
Products Affected
servmask
- all-in-one_wp_migration
CWE
No CWE.