Description
The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a request that when submitted by any visitor will inject arbitrary html or javascript into the response that will be executed in the victims session. Note: This requires knowledge of a static secret key
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Thu, 27 Mar 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-03-26T14:24:03.385Z
Reserved: 2022-07-26T16:07:20.207Z
Link: CVE-2022-2546
Updated: 2024-08-03T00:39:07.984Z
Status : Modified
Published: 2023-02-02T09:15:08.403
Modified: 2025-03-26T15:15:38.557
Link: CVE-2022-2546
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.