CVE-2022-1009
Summary
| CVE | CVE-2022-1009 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-05-30 09:15:00 UTC |
| Updated | 2022-06-08 17:20:00 UTC |
| Description | The Smush WordPress plugin before 3.9.9 does not sanitise and escape a configuration parameter before outputting it back in an admin page when uploading a malicious preset configuration, leading to a Reflected Cross-Site Scripting. For the attack to be successful, an attacker would need an admin to upload a malicious configuration file |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Attention Required! | Cloudflare |
MISC |
wpscan.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Taurus Omar
Legacy QID Mappings
- 150543 WordPress Smush Plugin : Reflected Cross-Site Scripting (XSS) Vulnerability (CVE-2022-1009)