Executive Summary

Informations
Name CVE-2022-4974 First vendor Publication 2024-10-16
Vendor Cve Last vendor Modification 2024-10-16

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Overall CVSS Score 6.3
Base Score 6.3 Environmental Score 6.3
impact SubScore 3.4 Temporal Score 6.3
Exploitabality Sub Score 2.8
 
Attack Vector Network Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact Low
Integrity Impact Low Availability Impact Low
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4974

Sources (Detail)

https://freemius.com/blog/managing-security-issues-open-source-freemius-sdk-s...
https://web.archive.org/web/20220225174410/https%3A//www.pluginvulnerabilitie...
https://wpdirectory.net/search/01FWPVWA7BC5DYGZHNSZQ9QMN5
https://wpdirectory.net/search/01G02RSGMFS1TPT63FS16RWEYR
https://wpscan.com/vulnerability/6dae6dca-7474-4008-9fe5-4c62b9f12d0a
https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-10-16 21:27:29
  • Multiple Updates
2024-10-16 13:27:31
  • First insertion