CVE-2022-2709

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with high-level access, like an admin, to inject malicious scripts into the website, which can then be executed by other users visiting the site. This can happen even if certain security settings are in place, such as when the site is part of a multisite setup that restricts direct HTML editing.

Technical Description

The Float to Top Button WordPress plugin through 2.3.6 does not escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$638($500-$1K)
Vendor Response
Grade FPatched in 1240 days

Quick Information

Published

Sep 19, 2022

over 3 years ago

Last Modified

Feb 10, 2026

10 days ago

Vendor

cagewebdev

Product

float to top button