{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-4820","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2022-12-28T20:41:40.953Z","datePublished":"2022-12-28T20:42:48.276Z","dateUpdated":"2024-08-03T01:55:45.454Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2022-12-28T20:42:48.276Z"},"title":"FlatPress Admin Area admin.entry.list.php cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Cross Site Scripting"}]}],"affected":[{"vendor":"n/a","product":"FlatPress","versions":[{"version":"n/a","status":"affected"}],"modules":["Admin Area"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in FlatPress. This affects an unknown part of the file admin/panels/entry/admin.entry.list.php of the component Admin Area. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 229752b51025e678370298284d42f8ebb231f67f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216999."},{"lang":"de","value":"Es wurde eine Schwachstelle in FlatPress entdeckt. Sie wurde als problematisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei admin/panels/entry/admin.entry.list.php der Komponente Admin Area. Mit der Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Patch wird als 229752b51025e678370298284d42f8ebb231f67f bezeichnet. Als bestmögliche Massnahme wird Patching empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"}}],"timeline":[{"time":"2022-12-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2022-12-28T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2022-12-28T21:47:45.000Z","lang":"en","value":"VulDB last update"}],"references":[{"url":"https://vuldb.com/?id.216999","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.216999","tags":["signature","permissions-required"]},{"url":"https://github.com/flatpressblog/flatpress/issues/180","tags":["issue-tracking"]},{"url":"https://github.com/flatpressblog/flatpress/commit/229752b51025e678370298284d42f8ebb231f67f","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:55:45.454Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.216999","tags":["vdb-entry","x_transferred"]},{"url":"https://vuldb.com/?ctiid.216999","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/flatpressblog/flatpress/issues/180","tags":["issue-tracking","x_transferred"]},{"url":"https://github.com/flatpressblog/flatpress/commit/229752b51025e678370298284d42f8ebb231f67f","tags":["patch","x_transferred"]}]}]}}