CVE-2022-29444

Breeze – WordPress Cache Plugin <= 2.0.2 - Unprotected AJAX Actions

mediumMissing Authorization
6.5
CVSS Score
6.5
CVSS Score
medium
Severity
2.0.3
Patched in
630d
Time to patch

Description

Plugin Settings Change leading to Cross-Site Scripting (XSS) vulnerability in Cloudways Breeze plugin <= 2.0.2 on WordPress allows users with a subscriber or higher user role to execute any of the wp_ajax_* actions in the class Breeze_Configuration which includes the ability to change any of the plugin's settings including CDN setting which could be further used for XSS attack.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Low
Confidentiality
Low
Integrity
Low
Availability

Technical Details

Affected versions<=2.0.2
PublishedMay 2, 2022
Last updatedJanuary 22, 2024
Affected pluginbreeze

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.