Description
The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a request that when submitted by any visitor will inject arbitrary html or javascript into the response that will be executed in the victims session. Note: This requires knowledge of a static secret key
Published: 2023-02-02
Score: 4.7 Medium
EPSS: 16.2% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 27 Mar 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Servmask All-in-one Wp Migration
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2025-03-26T14:24:03.385Z

Reserved: 2022-07-26T16:07:20.207Z

Link: CVE-2022-2546

cve-icon Vulnrichment

Updated: 2024-08-03T00:39:07.984Z

cve-icon NVD

Status : Modified

Published: 2023-02-02T09:15:08.403

Modified: 2025-03-26T15:15:38.557

Link: CVE-2022-2546

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses

No weakness.