
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-4368 is a security vulnerability affecting the WP CSV WordPress plugin through version 1.8.0.0. The vulnerability was discovered by Mesut Cetin and was publicly disclosed on December 15, 2022. The issue exists in the CSV import functionality of the plugin, where input parameters are not properly sanitized and escaped, and CSRF protection is absent (WPScan).
The vulnerability is classified as a Reflected Cross-Site Scripting (XSS) issue, identified as CWE-79. It has been assigned a CVSS score of 6.1 (Medium severity). The technical root cause stems from the plugin's failure to implement proper input sanitization and CSRF protection mechanisms when processing CSV imports (WPScan).
When exploited, this vulnerability allows attackers to execute arbitrary JavaScript code in the context of the admin user's browser session. This could potentially lead to unauthorized actions being performed on behalf of the administrator or the theft of sensitive information (WPScan).
As of the vulnerability disclosure, no official fix has been released for this security issue. Users of the WP CSV plugin should consider disabling the plugin until a security update becomes available (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."