Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-51483 | The Editorial Calendar WordPress plugin before 3.8.3 does not sanitise and escape its settings, allowing users with roles as low as contributor to inject arbitrary web scripts in the plugin admin panel, enabling a Stored Cross-Site Scripting vulnerability targeting higher privileged users. |
Wed, 27 Nov 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-11-27T19:38:53.182Z
Reserved: 2022-11-22T07:48:45.508Z
Link: CVE-2022-4115
Updated: 2024-08-03T01:27:54.445Z
Status : Modified
Published: 2023-06-27T14:15:10.077
Modified: 2024-11-21T07:34:36.490
Link: CVE-2022-4115
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD