
Cloud Vulnerability DB
A community-led vulnerabilities database
The Conference Scheduler WordPress plugin versions before 2.4.3 contains a Reflected Cross-Site Scripting vulnerability identified as CVE-2022-0600. The vulnerability was discovered and publicly disclosed on March 4, 2022. This security issue affects the plugin's admin page functionality (WPScan).
The vulnerability stems from improper sanitization and escaping of the 'tab' parameter in the admin page. When this parameter is processed, its value is output directly without proper security controls, enabling a reflected XSS attack. The vulnerability has been assigned a CVSS v3.1 base score of 6.1 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The issue is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) (NVD, WPScan).
The vulnerability allows attackers to execute arbitrary web scripts or HTML in a user's browser context when the victim accesses a specially crafted URL. This can lead to theft of sensitive information, session hijacking, or other malicious actions performed in the context of the authenticated admin user (WPScan).
Users are advised to update their Conference Scheduler plugin to version 2.4.3 or later, which contains the fix for this vulnerability (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."