
Cloud Vulnerability DB
A community-led vulnerabilities database
The Slickr Flickr WordPress plugin through version 2.8.1 contains a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2022-3021. The vulnerability was discovered and publicly disclosed on August 29, 2022. This security issue affects the plugin's settings functionality, specifically impacting installations where high-privilege users such as administrators are present (WPScan).
The vulnerability stems from improper sanitization and escaping of plugin settings. This security flaw allows high-privilege users to perform cross-site scripting attacks even when the unfilteredhtml capability is disabled. The vulnerability has been assigned a CVSS score of 3.4 (low severity) and is classified under CWE-79. The exploit can be triggered through the 'flickrid' parameter, where malicious JavaScript code can be injected and stored (WPScan).
When successfully exploited, the vulnerability allows stored XSS attacks to be executed whenever a user visits the affected page. The stored malicious code becomes persistent in the application and can potentially affect multiple users who access the compromised page (WPScan).
As of the vulnerability disclosure, there is no known fix available for this security issue in the Slickr Flickr plugin (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."