| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42779 | The Log HTTP Requests plugin for WordPress is vulnerable to Stored Cross-Site Scripting via logged HTTP requests in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers who can trick a site's administrator into performing an action like clicking on a link, or an authenticated user with access to a page that sends a request using user-supplied data via the server, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Log HTTP Requests <= 1.3.1 - Stored Cross-Site Scripting | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 31 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:16:09.451Z
Reserved: 2022-10-03T15:20:35.618Z
Link: CVE-2022-3402
Updated: 2024-08-03T01:07:06.641Z
Status : Modified
Published: 2022-10-28T19:15:09.857
Modified: 2026-04-08T19:17:52.993
Link: CVE-2022-3402
No data.
OpenCVE Enrichment
No data.
EUVD