Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42623 | The Passster WordPress plugin before 3.5.5.5.2 stores the password inside a cookie named "passster" using base64 encoding method which is easy to decode. This puts the password at risk in case the cookies get leaked. |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 14 May 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-05-14T20:15:49.826Z
Reserved: 2022-09-13T00:00:00.000Z
Link: CVE-2022-3206
Updated: 2024-08-03T01:00:10.811Z
Status : Modified
Published: 2022-10-17T12:15:10.530
Modified: 2025-05-14T21:15:53.757
Link: CVE-2022-3206
No data.
OpenCVE Enrichment
No data.
EUVD