CVE-2022-2864
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
The demon image annotation plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.7. This is due to missing nonce validation in the ~/includes/settings.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
| Vendor | demonisblack |
| Product | demon image annotation |
| Published | Oct 28, 2022 |
| Last Updated | Jan 31, 2025 |
Stay Ahead of the Next One
Get instant alerts for demonisblack demon image annotation
Be the first to know when new high vulnerabilities affecting demonisblack demon image annotation are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/A:H/I:H/C:H/S:U/UI:R/PR:N/AC:L/AV:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
demonisblack / demon image annotation
1.0 โค 4.7
References
plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/demon-image-annotation/trunk/includes/settings.php plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2772352%40demon-image-annotation&new=2772352%40demon-image-annotation&sfp_email=&sfph_mail= wordfence.com: https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2864
Credits
Yamato Kamioka