Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42546 | The OAuth client Single Sign On WordPress plugin before 3.0.4 does not have authorisation and CSRF when updating its settings, which could allow unauthenticated attackers to update them and change the OAuth endpoints to ones they controls, allowing them to then be authenticated as admin if they know the correct email address |
Wed, 21 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-05-21T19:16:49.270Z
Reserved: 2022-09-04T00:00:00.000Z
Link: CVE-2022-3119
Updated: 2024-08-03T01:00:10.532Z
Status : Modified
Published: 2022-09-26T13:15:11.217
Modified: 2025-05-21T20:15:28.627
Link: CVE-2022-3119
No data.
OpenCVE Enrichment
No data.
EUVD