{"api_version":"1","generated_at":"2026-04-15T22:35:23+00:00","cve":"CVE-2022-4672","urls":{"html":"https://cve.report/CVE-2022-4672","api":"https://cve.report/api/cve/CVE-2022-4672.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-4672","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-4672"},"summary":{"title":"CVE-2022-4672","description":"The WordPress Simple Shopping Cart WordPress plugin before 4.6.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2023-01-23 15:15:00","updated_at":"2023-11-07 03:58:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/6500271f-9d1c-40ed-be58-a6cea8d1110d","name":"https://wpscan.com/vulnerability/6500271f-9d1c-40ed-be58-a6cea8d1110d","refsource":"MISC","tags":[],"title":"WordPress Simple Shopping Cart < 4.6.2 - Contributor+ Stored XSS via Shortcode WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-4672","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4672","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"4672","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tipsandtricks-hq","cpe5":"wordpress_simple_paypal_shopping_cart","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-4672","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The WordPress Simple Shopping Cart WordPress plugin before 4.6.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-Site Scripting (XSS)"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"WordPress Simple Shopping Cart","version":{"version_data":[{"version_value":"0","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/6500271f-9d1c-40ed-be58-a6cea8d1110d","refsource":"MISC","name":"https://wpscan.com/vulnerability/6500271f-9d1c-40ed-be58-a6cea8d1110d"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"Lana Codes"},{"lang":"en","value":"WPScan"}]},"nvd":{"publishedDate":"2023-01-23 15:15:00","lastModifiedDate":"2023-11-07 03:58:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tipsandtricks-hq:wordpress_simple_paypal_shopping_cart:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"4.6.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}