
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-43497 is a cross-site scripting (XSS) vulnerability affecting WordPress versions prior to 6.0.3, discovered and disclosed in October 2022. The vulnerability allows remote unauthenticated attackers to inject arbitrary scripts into WordPress websites. This security issue specifically affects the WordPress Post by Email Feature (JVN Report, WordPress News).
The vulnerability has been assigned a CVSS v3.0 base score of 6.1 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N), indicating moderate severity. The attack vector is network-accessible (AV:N), requires low attack complexity (AC:L), needs no privileges (PR:N), and requires user interaction (UI:R). The scope is changed (S:C), with low impacts on both confidentiality and integrity (JVN Report).
When successfully exploited, this vulnerability allows attackers to execute arbitrary scripts in the web browser of users accessing the affected WordPress website. This could potentially lead to unauthorized actions being performed on behalf of the victim user (JVN Report).
WordPress has addressed this vulnerability in version 6.0.3. The developer has also provided patched releases for all versions since WordPress 3.7. Users are strongly recommended to update their WordPress installations to the latest version to mitigate this security risk (WordPress News).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."