
Cloud Vulnerability DB
A community-led vulnerabilities database
An Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Awesome Filterable Portfolio WordPress plugin versions 1.9.7 and below. The vulnerability was assigned CVE-2022-40193 and was disclosed on September 14, 2022. The plugin has been closed due to this security issue and is no longer available for download from the WordPress plugin repository (WordPress Plugin, CVE Mitre).
The vulnerability has been assigned a CVSS v3.1 score with the following metrics: AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N, indicating it can be exploited over the network, requires low attack complexity, needs no privileges, and requires no user interaction (Wordfence).
The vulnerability allows attackers to inject and store malicious scripts that can be executed in users' browsers when they visit affected pages, potentially leading to compromised user sessions, data theft, or malicious redirects (Patchstack).
As the plugin has been closed and is no longer maintained, the recommended mitigation is to completely remove the Awesome Filterable Portfolio plugin from WordPress installations. Website administrators should seek alternative portfolio plugins that are actively maintained and secure (WordPress Plugin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."