CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS
Percentile
72.5%
WordPress is a free and open-source content management system written in
PHP and paired with a MariaDB database. Low-privileged authenticated users
(like author) in WordPress core are able to execute JavaScript/perform
stored XSS attack, which can affect high-privileged users. This has been
patched in WordPress version 5.8.3. Older affected versions are also fixed
via security release, that go back till 3.7.37. We strongly recommend that
you keep auto-updates enabled. There are no known workarounds for this
issue.
github.com/WordPress/wordpress-develop/security/advisories/GHSA-699q-3hj9-889w
hackerone.com/reports/425342
launchpad.net/bugs/cve/CVE-2022-21662
nvd.nist.gov/vuln/detail/CVE-2022-21662
security-tracker.debian.org/tracker/CVE-2022-21662
wordpress.org/news/2022/01/wordpress-5-8-3-security-release/
www.cve.org/CVERecord?id=CVE-2022-21662
www.debian.org/security/2022/dsa-5039
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS
Percentile
72.5%