Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-52011 | The MediaElement.js WordPress plugin through 4.2.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high-privilege users such as admins. |
Mon, 21 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mediaelementjs
Mediaelementjs mediaelement.js |
|
| CPEs | cpe:2.3:a:mediaelementjs:mediaelement.js:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Mediaelement.js Project
Mediaelement.js Project mediaelement.js |
Mediaelementjs
Mediaelementjs mediaelement.js |
Thu, 27 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-03-27T19:24:11.989Z
Reserved: 2022-12-23T16:31:50.044Z
Link: CVE-2022-4699
Updated: 2024-08-03T01:48:39.997Z
Status : Analyzed
Published: 2023-01-30T21:15:11.907
Modified: 2025-04-21T13:58:19.353
Link: CVE-2022-4699
No data.
OpenCVE Enrichment
No data.
EUVD