{"api_version":"1","generated_at":"2026-05-14T03:14:58+00:00","cve":"CVE-2022-3747","urls":{"html":"https://cve.report/CVE-2022-3747","api":"https://cve.report/api/cve/CVE-2022-3747.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-3747","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-3747"},"summary":{"title":"Becustom <= 1.0.5.2 - Cross-Site Request Forgery","description":"The Becustom plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.5.2. This is due to missing nonce validation when saving the plugin's settings. This makes it possible for unauthenticated attackers to update the plugin's settings like betheme_url_slug, replaced_theme_author, and betheme_label to name a few, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.","state":"PUBLISHED","assigner":"Wordfence","published_at":"2022-11-29 21:15:11","updated_at":"2026-04-08 18:17:30"},"problem_types":["CWE-352","CWE-352 CWE-352 Cross-Site Request Forgery (CSRF)"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"security@wordfence.com","type":"Secondary","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","data":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3747.txt","name":"https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3747.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"],"title":"advisories/CVE-2022-3747.txt at master · MrTuxracer/advisories · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3747","name":"https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3747","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Vulnerability Advisories Continued - Wordfence","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/83c0e096-f054-4367-a85f-582c0771e3fe?source=cve","name":"https://www.wordfence.com/threat-intel/vulnerabilities/id/83c0e096-f054-4367-a85f-582c0771e3fe?source=cve","refsource":"security@wordfence.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://muffingroup.com/betheme/features/be-custom/","name":"https://muffingroup.com/betheme/features/be-custom/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"],"title":"Be Custom Branding - Betheme WordPress Theme","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-3747","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3747","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"MuffinGroup","product":"Becustom","version":"affected 1.0.5.2 semver","platforms":[]}],"timeline":[{"source":"CNA","time":"2022-11-14T00:00:00.000Z","lang":"en","value":"Disclosed"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Julien Ahrens","lang":"en"}],"nvd_cpes":[{"cve_year":"2022","cve_id":"3747","vulnerable":"1","versionEndIncluding":"1.0.5.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"muffingroup","cpe5":"becustom","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-03T01:20:57.990Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://muffingroup.com/betheme/features/be-custom/"},{"tags":["x_transferred"],"url":"https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3747.txt"},{"tags":["x_transferred"],"url":"https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3747"}],"title":"CVE Program Container"},{"metrics":[{"other":{"content":{"id":"CVE-2022-3747","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2025-01-23T21:17:49.509626Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2025-01-23T21:17:57.243Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Becustom","vendor":"MuffinGroup","versions":[{"lessThanOrEqual":"1.0.5.2","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Julien Ahrens"}],"descriptions":[{"lang":"en","value":"The Becustom plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.5.2. This is due to missing nonce validation when saving the plugin's settings. This makes it possible for unauthenticated attackers to update the plugin's settings like betheme_url_slug, replaced_theme_author, and betheme_label to name a few, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."}],"metrics":[{"cvssV3_1":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T17:04:14.478Z","orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence"},"references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/83c0e096-f054-4367-a85f-582c0771e3fe?source=cve"},{"url":"https://muffingroup.com/betheme/features/be-custom/"},{"url":"https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3747.txt"},{"url":"https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3747"}],"timeline":[{"lang":"en","time":"2022-11-14T00:00:00.000Z","value":"Disclosed"}],"title":"Becustom <= 1.0.5.2 - Cross-Site Request Forgery"}},"cveMetadata":{"assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","assignerShortName":"Wordfence","cveId":"CVE-2022-3747","datePublished":"2022-11-29T20:41:02.181Z","dateReserved":"2022-10-28T14:56:08.128Z","dateUpdated":"2026-04-08T17:04:14.478Z","requesterUserId":"8d345d3f-a59e-4410-a440-fac6e918fcfc","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2022-11-29 21:15:11","lastModifiedDate":"2026-04-08 18:17:30","problem_types":["CWE-352","CWE-352 CWE-352 Cross-Site Request Forgery (CSRF)"],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:muffingroup:becustom:*:*:*:*:*:wordpress:*:*","versionEndIncluding":"1.0.5.2","matchCriteriaId":"5C7DE6A5-183C-48B7-BF0E-2DFAE5E0121D"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"3747","Ordinal":"1","Title":"Becustom <= 1.0.5.2 - Cross-Site Request Forgery","CVE":"CVE-2022-3747","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"3747","Ordinal":"1","NoteData":"The Becustom plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.5.2. This is due to missing nonce validation when saving the plugin's settings. This makes it possible for unauthenticated attackers to update the plugin's settings like betheme_url_slug, replaced_theme_author, and betheme_label to name a few, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.","Type":"Description","Title":"Becustom <= 1.0.5.2 - Cross-Site Request Forgery"}]}}}