CVE-2022-4759

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with contributor permissions or higher to inject malicious scripts into a WordPress page or post, which can then execute when other users view the content. It occurs because the GigPress plugin fails to properly check and clean up certain shortcode attributes before displaying them.

Technical Description

The GigPress WordPress plugin before 2.3.28 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$741($500-$1K)
Vendor Response
Grade FPatched in 1100 days

Quick Information

Published

Feb 13, 2023

about 3 years ago

Last Modified

Feb 17, 2026

3 days ago

Vendor

tri

Product

gigpress