{"containers":{"cna":{"affected":[{"product":"WP Sticky Button – Click to Chat","vendor":"Unknown","versions":[{"lessThan":"1.4.1","status":"affected","version":"1.4.1","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Krzysztof Zając"}],"descriptions":[{"lang":"en","value":"The WP Sticky Button WordPress plugin before 1.4.1 does not have authorisation and CSRF checks when saving its settings, allowing unauthenticated users to update them. Furthermore, due to the lack of escaping in some of them, it could lead to Stored Cross-Site Scripting issues"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-Site Scripting (XSS)","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-08-22T15:01:53.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/caab1fca-cc6b-45bb-bd0d-f857edd8bb81"}],"source":{"discovery":"EXTERNAL"},"title":"WP Sticky Button < 1.4.1 - Unauthenticated Arbitrary Settings Update to Stored XSS","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2022-2375","STATE":"PUBLIC","TITLE":"WP Sticky Button < 1.4.1 - Unauthenticated Arbitrary Settings Update to Stored XSS"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"WP Sticky Button – Click to Chat","version":{"version_data":[{"version_affected":"<","version_name":"1.4.1","version_value":"1.4.1"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Krzysztof Zając"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The WP Sticky Button WordPress plugin before 1.4.1 does not have authorisation and CSRF checks when saving its settings, allowing unauthenticated users to update them. Furthermore, due to the lack of escaping in some of them, it could lead to Stored Cross-Site Scripting issues"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-Site Scripting (XSS)"}]},{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/caab1fca-cc6b-45bb-bd0d-f857edd8bb81","refsource":"MISC","url":"https://wpscan.com/vulnerability/caab1fca-cc6b-45bb-bd0d-f857edd8bb81"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:32:09.626Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/caab1fca-cc6b-45bb-bd0d-f857edd8bb81"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-2375","datePublished":"2022-08-22T15:01:53.000Z","dateReserved":"2022-07-11T00:00:00.000Z","dateUpdated":"2024-08-03T00:32:09.626Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}