The demon image annotation plugin for WordPress is vulnerable to improper input validation in versions up to, and including 5.0. This is due to the plugin improperly validating the number of characters supplied during an annotation despite there being a setting to limit the number characters input. This means that unauthenticated attackers can bypass the length restrictions and input more characters than allowed via the settings.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2022-51532 | The demon image annotation plugin for WordPress is vulnerable to improper input validation in versions up to, and including 5.0. This is due to the plugin improperly validating the number of characters supplied during an annotation despite there being a setting to limit the number characters input. This means that unauthenticated attackers can bypass the length restrictions and input more characters than allowed via the settings. | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Thu, 23 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-01-23T20:32:54.812Z
Reserved: 2022-11-28T18:08:09.657Z
Link: CVE-2022-4171
Updated: 2024-08-03T01:34:49.355Z
Status : Modified
Published: 2022-12-13T21:15:11.870
Modified: 2024-11-21T07:34:42.740
Link: CVE-2022-4171
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD