
Cloud Vulnerability DB
A community-led vulnerabilities database
The Ditty (formerly Ditty News Ticker) WordPress plugin before version 3.0.15 was identified with a Reflected Cross-Site Scripting (XSS) vulnerability, tracked as CVE-2022-0533. The vulnerability was discovered and publicly disclosed on February 9, 2022. This security issue affects all versions of the plugin prior to the patched version 3.0.15 (NVD, WPScan).
The vulnerability is classified as a Reflected Cross-Site Scripting (XSS) issue with a CVSS v3.1 base score of 6.1 (Medium) and vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The vulnerability is tracked under CWE-79 (Improper Neutralization of Input During Web Page Generation). A proof of concept demonstrates that the vulnerability can be exploited through the plugin's settings page URL parameters (WPScan).
The vulnerability allows attackers to execute malicious JavaScript code in the context of other users' browsers who visit specially crafted URLs. This could lead to theft of sensitive information, session hijacking, or other client-side attacks against WordPress administrators or users with access to the affected pages (NVD).
Users are advised to update to Ditty version 3.0.15 or later which contains the security fix for this vulnerability. The fix was implemented through a patch that can be found in the WordPress plugin repository (WordPress Plugin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."