{"containers":{"cna":{"affected":[{"product":"WP Downgrade | Specific Core Version","vendor":"Unknown","versions":[{"lessThan":"1.2.3","status":"affected","version":"1.2.3","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Taurus Omar"}],"descriptions":[{"lang":"en","value":"The WP Downgrade WordPress plugin before 1.2.3 only perform client side validation of its \"WordPress Target Version\" settings, but does not sanitise and escape it server side, allowing high privilege users such as admin to perform Cross-Site attacks even when the unfiltered_html capability is disallowed"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-04-18T17:10:42.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/34a7b3cd-e2b5-4891-ab33-af6a2a0eeceb"},{"tags":["x_refsource_CONFIRM"],"url":"https://plugins.trac.wordpress.org/changeset/2696091"}],"source":{"discovery":"EXTERNAL"},"title":"WP Downgrade < 1.2.3 - Admin+ Stored Cross-Site Scripting","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2022-1001","STATE":"PUBLIC","TITLE":"WP Downgrade < 1.2.3 - Admin+ Stored Cross-Site Scripting"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"WP Downgrade | Specific Core Version","version":{"version_data":[{"version_affected":"<","version_name":"1.2.3","version_value":"1.2.3"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Taurus Omar"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The WP Downgrade WordPress plugin before 1.2.3 only perform client side validation of its \"WordPress Target Version\" settings, but does not sanitise and escape it server side, allowing high privilege users such as admin to perform Cross-Site attacks even when the unfiltered_html capability is disallowed"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/34a7b3cd-e2b5-4891-ab33-af6a2a0eeceb","refsource":"MISC","url":"https://wpscan.com/vulnerability/34a7b3cd-e2b5-4891-ab33-af6a2a0eeceb"},{"name":"https://plugins.trac.wordpress.org/changeset/2696091","refsource":"CONFIRM","url":"https://plugins.trac.wordpress.org/changeset/2696091"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:47:43.232Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/34a7b3cd-e2b5-4891-ab33-af6a2a0eeceb"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset/2696091"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-1001","datePublished":"2022-04-18T17:10:42.000Z","dateReserved":"2022-03-17T00:00:00.000Z","dateUpdated":"2024-08-02T23:47:43.232Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}