Plugin Settings Change leading to Cross-Site Scripting (XSS) vulnerability in Cloudways Breeze plugin <= 2.0.2 on WordPress allows users with a subscriber or higher user role to execute any of the wp_ajax_* actions in the class Breeze_Configuration which includes the ability to change any of the plugin's settings including CDN setting which could be further used for XSS attack.
References
Link | Resource |
---|---|
https://patchstack.com/database/vulnerability/breeze/wordpress-breeze-plugin-2-0-2-plugin-settings-change-leading-to-cross-site-scripting-xss-vulnerability | Third Party Advisory |
https://wordpress.org/plugins/breeze/#developers | Third Party Advisory |
Configurations
History
09 May 2022, 22:07
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cloudways:breeze:*:*:*:*:*:*:*:* | |
References | (CONFIRM) https://patchstack.com/database/vulnerability/breeze/wordpress-breeze-plugin-2-0-2-plugin-settings-change-leading-to-cross-site-scripting-xss-vulnerability - Third Party Advisory | |
References | (CONFIRM) https://wordpress.org/plugins/breeze/#developers - Third Party Advisory | |
First Time |
Cloudways breeze
Cloudways |
|
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 5.4 |
02 May 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-02 20:15
Updated : 2023-12-10 14:22
NVD link : CVE-2022-29444
Mitre link : CVE-2022-29444
CVE.ORG link : CVE-2022-29444
JSON object : View
Products Affected
cloudways
- breeze