{"containers":{"cna":{"affected":[{"product":"Stop Spam Comments","vendor":"Unknown","versions":[{"lessThanOrEqual":"0.2.1.2","status":"affected","version":"0.2.1.2","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Daniel Ruf"}],"descriptions":[{"lang":"en","value":"The Stop Spam Comments WordPress plugin through 0.2.1.2 does not properly generate the Javascript access token for preventing abuse of comment section, allowing threat authors to easily collect the value and add it to the request."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-200","description":"CWE-200 Information Exposure","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-08-29T14:40:25.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/30820be1-e96a-4ff6-b1ec-efda14069e70"}],"source":{"discovery":"EXTERNAL"},"title":"Stop Spam Comments <= 0.2.1.2 - Access Token Bypass","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2022-1663","STATE":"PUBLIC","TITLE":"Stop Spam Comments <= 0.2.1.2 - Access Token Bypass"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Stop Spam Comments","version":{"version_data":[{"version_affected":"<=","version_name":"0.2.1.2","version_value":"0.2.1.2"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Daniel Ruf"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Stop Spam Comments WordPress plugin through 0.2.1.2 does not properly generate the Javascript access token for preventing abuse of comment section, allowing threat authors to easily collect the value and add it to the request."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200 Information Exposure"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/30820be1-e96a-4ff6-b1ec-efda14069e70","refsource":"MISC","url":"https://wpscan.com/vulnerability/30820be1-e96a-4ff6-b1ec-efda14069e70"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:10:03.842Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/30820be1-e96a-4ff6-b1ec-efda14069e70"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-1663","datePublished":"2022-08-29T14:40:25.000Z","dateReserved":"2022-05-10T00:00:00.000Z","dateUpdated":"2024-08-03T00:10:03.842Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}