
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-1763 affects the WordPress plugin Static Page eXtended (version <= 2.1). The vulnerability was discovered and reported by Daniel Ruf, with public disclosure on May 23, 2022. This security issue involves a Cross-Site Request Forgery (CSRF) vulnerability that can lead to arbitrary settings updates and potential Stored Cross-Site Scripting (XSS) attacks (WPScan).
The vulnerability stems from missing security checks in the plugin that make it susceptible to CSRF attacks. These attacks can allow unauthorized modification of plugin settings, including changes to required user levels for specific features. Additionally, due to inadequate escaping in some settings, the vulnerability can escalate to Stored Cross-Site Scripting. The vulnerability has been assigned a CVSS score of 6.1 (medium severity) and is classified under CWE-352 (WPScan).
The vulnerability allows attackers to modify plugin settings through CSRF attacks and potentially execute stored XSS attacks. This could lead to unauthorized access control changes and potential execution of malicious scripts in users' browsers (WPScan).
As of the last update, there is no known fix for this vulnerability in the jp-staticpagex plugin (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."