Search for vulnerabilities
Vulnerability ID | VCID-qpx8-h6j2-5yb5 |
Aliases |
CVE-2022-4973
|
Summary | WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 4.9 |
Risk | 2.5 |
Affected and Fixed Packages | Package Details |
Reference id | Reference type | URL |
---|---|---|
https://api.first.org/data/v1/epss?cve=CVE-2022-4973 | ||
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4973 | ||
1018863 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018863 | |
53961 | https://core.trac.wordpress.org/changeset/53961 | |
b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve | https://www.wordfence.com/threat-intel/vulnerabilities/id/b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve | |
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | |
CVE-2022-4973 | https://nvd.nist.gov/vuln/detail/CVE-2022-4973 | |
wordpress-6-0-2-security-and-maintenance-release | https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release/ | |
wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know | https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/ |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.4267 |
EPSS Score | 0.00202 |
Published At | July 30, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-31T09:53:58.270720+00:00 | Vulnrichment | Import | https://github.com/cisagov/vulnrichment/blob/develop/2022/4xxx/CVE-2022-4973.json | 37.0.0 |