The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a request that when submitted by any visitor will inject arbitrary html or javascript into the response that will be executed in the victims session. Note: This requires knowledge of a static secret key
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: WPScan
Published: 2023-02-02T08:28:46.865Z
Updated: 2024-08-03T00:39:07.984Z
Reserved: 2022-07-26T16:07:20.207Z
Link: CVE-2022-2546
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-02-02T09:15:08.403
Modified: 2024-11-21T07:01:13.640
Link: CVE-2022-2546
Redhat
No data.