{"containers":{"cna":{"affected":[{"product":"Image optimization & Lazy Load by Optimole","vendor":"Unknown","versions":[{"lessThan":"3.3.2","status":"affected","version":"3.3.2","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Mika"}],"descriptions":[{"lang":"en","value":"The Image optimization & Lazy Load by Optimole WordPress plugin before 3.3.2 does not sanitise and escape its \"Lazyload background images for selectors\" settings, which could allow high privilege users such as admin to perform Cross-Site scripting attacks even when the unfiltered_html capability is disallowed."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-04-11T14:41:01.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/59a7a441-7384-4006-89b4-15345f70fabf"},{"tags":["x_refsource_CONFIRM"],"url":"https://plugins.trac.wordpress.org/changeset/2695242"}],"source":{"discovery":"EXTERNAL"},"title":"Image optimization & Lazy Load < 3.3.2 - Admin+ Stored Cross-Site Scripting","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2022-0969","STATE":"PUBLIC","TITLE":"Image optimization & Lazy Load < 3.3.2 - Admin+ Stored Cross-Site Scripting"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Image optimization & Lazy Load by Optimole","version":{"version_data":[{"version_affected":"<","version_name":"3.3.2","version_value":"3.3.2"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Mika"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Image optimization & Lazy Load by Optimole WordPress plugin before 3.3.2 does not sanitise and escape its \"Lazyload background images for selectors\" settings, which could allow high privilege users such as admin to perform Cross-Site scripting attacks even when the unfiltered_html capability is disallowed."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/59a7a441-7384-4006-89b4-15345f70fabf","refsource":"MISC","url":"https://wpscan.com/vulnerability/59a7a441-7384-4006-89b4-15345f70fabf"},{"name":"https://plugins.trac.wordpress.org/changeset/2695242","refsource":"CONFIRM","url":"https://plugins.trac.wordpress.org/changeset/2695242"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:47:42.871Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/59a7a441-7384-4006-89b4-15345f70fabf"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset/2695242"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-0969","datePublished":"2022-04-11T14:41:01.000Z","dateReserved":"2022-03-14T00:00:00.000Z","dateUpdated":"2024-08-02T23:47:42.871Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}