
Cloud Vulnerability DB
A community-led vulnerabilities database
The Passster WordPress plugin before version 3.5.5.5.2 contains a security vulnerability identified as CVE-2022-3206. The vulnerability stems from the plugin's insecure storage of passwords, where it stores the password inside a cookie named "passster" using base64 encoding method, which is easily decodable. This vulnerability was discovered by Raad Haddad of Cloudyrion GmbH and was publicly disclosed on September 21, 2022 (WPScan).
The vulnerability has been assigned a CVSS v3.1 base score of 5.9 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N. The issue is classified under CWE-522 (Insufficiently Protected Credentials) and CWE-319 (Cleartext Transmission of Sensitive Information). The vulnerability specifically relates to the insecure storage mechanism where passwords are stored using base64 encoding, which is a reversible encoding scheme rather than a secure encryption method (NVD).
If exploited, this vulnerability could lead to unauthorized access to protected content if cookies are leaked, as the passwords stored in the cookies can be easily decoded due to the use of base64 encoding. This puts sensitive authentication credentials at risk of exposure (WPScan).
Users of the Passster WordPress plugin should update to version 3.5.5.5.2 or later, which addresses this vulnerability. If immediate updating is not possible, administrators should consider implementing additional security measures to protect cookie data and monitor for unauthorized access attempts (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."