The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a request that when submitted by any visitor will inject arbitrary html or javascript into the response that will be executed in the victims session. Note: This requires knowledge of a static secret key
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58 - Exploit, Third Party Advisory |
07 Nov 2023, 03:46
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2023-02-02 09:15
Updated : 2025-03-26 15:15
NVD link : CVE-2022-2546
Mitre link : CVE-2022-2546
CVE.ORG link : CVE-2022-2546
JSON object : View
Products Affected
servmask
- all-in-one_wp_migration
CWE
No CWE.