First published: Wed Dec 28 2022(Updated: )
A vulnerability, which was classified as problematic, has been found in FlatPress. This issue affects some unknown processing of the file setup/lib/main.lib.php of the component Setup. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1. It is recommended to apply a patch to fix this issue. The identifier VDB-217001 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
openMairie Openpresse |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4822 is classified as a problematic vulnerability.
CVE-2022-4822 allows for cross-site scripting attacks through the file setup/lib/main.lib.php.
CVE-2022-4822 can be exploited by attackers remotely.
The main impact of CVE-2022-4822 is the potential for executing malicious scripts in the context of the user's browser.
To fix CVE-2022-4822, update FlatPress to the latest version that addresses this vulnerability.