{"api_version":"1","generated_at":"2026-04-24T22:10:24+00:00","cve":"CVE-2022-4667","urls":{"html":"https://cve.report/CVE-2022-4667","api":"https://cve.report/api/cve/CVE-2022-4667.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-4667","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-4667"},"summary":{"title":"CVE-2022-4667","description":"The RSS Aggregator by Feedzy WordPress plugin before 4.1.1 does not validate and escape some of its block options before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2023-01-30 21:15:00","updated_at":"2023-11-07 03:58:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/a388232b-a399-46a5-83e6-20c1b5df351d","name":"https://wpscan.com/vulnerability/a388232b-a399-46a5-83e6-20c1b5df351d","refsource":"MISC","tags":[],"title":"RSS Aggregator by Feedzy < 4.1.1 - Contributor+ Stored XSS WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-4667","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4667","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"4667","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"themeisle","cpe5":"rss_aggregator_by_feedzy","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-4667","qid":"591270","title":"Rockwell Automation MicroLogix 1100 and 1400 Denial of Service (DoS) Multiple Vulnerabilities (ICSA-22-354-04)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-4667","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The RSS Aggregator by Feedzy WordPress plugin before 4.1.1 does not validate and escape some of its block options before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-Site Scripting (XSS)"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"RSS Aggregator by Feedzy","version":{"version_data":[{"version_value":"0","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/a388232b-a399-46a5-83e6-20c1b5df351d","refsource":"MISC","name":"https://wpscan.com/vulnerability/a388232b-a399-46a5-83e6-20c1b5df351d"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Lana Codes"},{"lang":"en","value":"WPScan"}]},"nvd":{"publishedDate":"2023-01-30 21:15:00","lastModifiedDate":"2023-11-07 03:58:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:themeisle:rss_aggregator_by_feedzy:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"4.1.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}