
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2022-4005 affects the WordPress plugin 'Donation Button' versions 4.0.0 and below. The vulnerability was publicly disclosed on November 16, 2022, and involves a stored Cross-Site Scripting (XSS) weakness that could be exploited by users with Contributor-level privileges or higher (WPScan).
The vulnerability stems from insufficient sanitization and escaping of certain parameters in the Donation Button plugin. The vulnerability has been assigned a CVSS score of 6.8 (medium severity) and is classified under CWE-79. The issue specifically allows for stored XSS attacks through unsanitized parameters in the plugin's shortcode functionality (WPScan).
When exploited, this vulnerability allows attackers with Contributor-level access or higher to inject malicious JavaScript code into WordPress posts through the plugin's shortcode. This could potentially lead to the execution of arbitrary JavaScript code in visitors' browsers when viewing affected pages (WPScan).
As of the vulnerability disclosure, no known fix has been released for this issue. Website administrators using the affected plugin should consider either removing the plugin or implementing additional security controls to restrict access to the shortcode functionality (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."