Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2022-4604
PUBLISHED
More InfoOfficial Page
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
View Known Exploited Vulnerability (KEV) details
Published At-18 Dec, 2022 | 00:00
Updated At-03 Aug, 2024 | 01:41
Rejected At-
▼CVE Numbering Authority (CNA)
wp-english-wp-admin Plugin english-wp-admin.php register_endpoints cross-site request forgery

A vulnerability classified as problematic was found in wp-english-wp-admin Plugin up to 1.5.1. Affected by this vulnerability is the function register_endpoints of the file english-wp-admin.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. Upgrading to version 1.5.2 is able to address this issue. The name of the patch is ad4ba171c974c65c3456e7c6228f59f40783b33d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216199.

Affected Products
Vendor
n/a
Product
wp-english-wp-admin Plugin
Versions
Affected
  • 1.5.0
  • 1.5.1
Problem Types
TypeCWE IDDescription
CWECWE-352CWE-352 Cross-Site Request Forgery
Type: CWE
CWE ID: CWE-352
Description: CWE-352 Cross-Site Request Forgery
Metrics
VersionBase scoreBase severityVector
3.14.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
3.04.3MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Version: 3.0
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Advisory disclosed2022-12-18 00:00:00
VulDB entry created2022-12-18 01:00:00
VulDB last update2022-12-24 15:07:06
Event: Advisory disclosed
Date: 2022-12-18 00:00:00
Event: VulDB entry created
Date: 2022-12-18 01:00:00
Event: VulDB last update
Date: 2022-12-24 15:07:06
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.216199
technical-description
vdb-entry
https://github.com/khromov/wp-english-wp-admin/commit/ad4ba171c974c65c3456e7c6228f59f40783b33d
mitigation
patch
https://github.com/khromov/wp-english-wp-admin/releases/tag/1.5.2
mitigation
Hyperlink: https://vuldb.com/?id.216199
Resource:
technical-description
vdb-entry
Hyperlink: https://github.com/khromov/wp-english-wp-admin/commit/ad4ba171c974c65c3456e7c6228f59f40783b33d
Resource:
mitigation
patch
Hyperlink: https://github.com/khromov/wp-english-wp-admin/releases/tag/1.5.2
Resource:
mitigation
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.216199
technical-description
vdb-entry
x_transferred
https://github.com/khromov/wp-english-wp-admin/commit/ad4ba171c974c65c3456e7c6228f59f40783b33d
mitigation
patch
x_transferred
https://github.com/khromov/wp-english-wp-admin/releases/tag/1.5.2
mitigation
x_transferred
Hyperlink: https://vuldb.com/?id.216199
Resource:
technical-description
vdb-entry
x_transferred
Hyperlink: https://github.com/khromov/wp-english-wp-admin/commit/ad4ba171c974c65c3456e7c6228f59f40783b33d
Resource:
mitigation
patch
x_transferred
Hyperlink: https://github.com/khromov/wp-english-wp-admin/releases/tag/1.5.2
Resource:
mitigation
x_transferred
Details not found