{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-0058","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","dateReserved":"2023-01-05T02:12:37.891Z","datePublished":"2023-08-16T11:03:23.680Z","dateUpdated":"2024-08-02T04:54:32.601Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-08-16T11:03:23.680Z"},"title":"Tiempo.com <= 0.1.2 - Stored XSS via CSRF","problemTypes":[{"descriptions":[{"description":"CWE-79 Cross-Site Scripting (XSS)","lang":"en","type":"CWE"}]},{"descriptions":[{"description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Tiempo.com","versions":[{"status":"affected","versionType":"custom","version":"0","lessThanOrEqual":"0.1.2"}],"defaultStatus":"affected","collectionURL":"https://wordpress.org/plugins"}],"descriptions":[{"lang":"en","value":"The Tiempo.com WordPress plugin through 0.1.2 does not have CSRF check when creating and editing its shortcode, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack"}],"references":[{"url":"https://wpscan.com/vulnerability/0e677df9-2c49-42f0-a8e2-dbcf85bfc1a2","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"Shreya Pohekar","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T04:54:32.601Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/0e677df9-2c49-42f0-a8e2-dbcf85bfc1a2","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]}]}}