Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Curtain
Curtain curtain Wordpress Wordpress wordpress |
|
| Vendors & Products |
Curtain
Curtain curtain Wordpress Wordpress wordpress |
Sun, 10 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress Plugin Curtain 1.0.2 contains a cross-site request forgery vulnerability that allows attackers to activate or deactivate site maintenance mode by crafting malicious requests. Attackers can trick authenticated administrators into submitting forged requests to the options-general.php page with curtain parameters to toggle maintenance mode without valid nonce validation. | |
| Title | WordPress Plugin Curtain 1.0.2 Cross-site Request Forgery | |
| First Time appeared |
Curtain Project
Curtain Project curtain |
|
| Weaknesses | CWE-352 | |
| CPEs | cpe:2.3:a:curtain_project:curtain:1.0.2:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Curtain Project
Curtain Project curtain |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T14:49:35.155Z
Reserved: 2026-01-11T13:34:26.332Z
Link: CVE-2022-50955
Updated: 2026-05-11T14:49:31.743Z
Status : Deferred
Published: 2026-05-10T13:16:33.047
Modified: 2026-05-12T14:24:15.210
Link: CVE-2022-50955
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:23:54Z