The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a request that when submitted by any visitor will inject arbitrary html or javascript into the response that will be executed in the victims session. Note: This requires knowledge of a static secret key
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/f84920e4-a1fe-47cf-9ba5-731989c70f58 | Exploit Third Party Advisory |
Configurations
Information
Published : 2023-02-02 01:15
Updated : 2023-02-09 10:39
NVD link : CVE-2022-2546
Mitre link : CVE-2022-2546
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
servmask
- all-in-one_wp_migration