
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2022-1758 affects the WordPress plugin Genki Pre-Publish Reminder versions 1.4.1 and below. This security issue was publicly disclosed on May 23, 2022, and involves a combination of Cross-Site Request Forgery (CSRF), Stored Cross-Site Scripting (XSS), and potential Remote Code Execution (RCE) vulnerabilities. The vulnerability received a CVSS score of 8.8 (high severity) (WPScan).
The vulnerability stems from the absence of CSRF protection mechanisms in the plugin's settings update functionality. The technical classification includes CSRF (CWE-352) and falls under the OWASP Top 10 category A2: Broken Authentication and Session Management. The vulnerability can be exploited through a combination of CSRF attacks that could lead to both Stored XSS and RCE when custom code is added via the plugin settings (WPScan).
The successful exploitation of this vulnerability could allow attackers to execute malicious code on the affected WordPress installation through stored XSS attacks and potentially achieve remote code execution. This could lead to complete compromise of the WordPress site when an administrator is tricked into triggering the CSRF payload (WPScan).
As of the last update, there is no known fix available for this vulnerability. The recommended action would be to remove or disable the Genki Pre-Publish Reminder plugin until a security patch is released (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."