vulnerability
WordPress Plugin: zephyr-project-manager: CVE-2022-2839: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:P/A:N) | Sep 8, 2022 | May 15, 2025 | May 5, 2026 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Sep 8, 2022
Added
May 15, 2025
Modified
May 5, 2026
Description
The Zephyr Project Manager plugin for WordPress is vulnerable to authorization bypass due to a missing capability check and lack of authentication/authorization on its AJAX endpoints in versions up to 3.2.55. This makes it possible for unauthenticated attackers to utilize them. Additionally, user input is not properly sanitized leading to Stored Cross-Site Scripting.
Solution
zephyr-project-manager-plugin-cve-2022-2839
References
- https://www.cve.org/CVERecord?id=CVE-2022-2839
- https://www.wordfence.com/threat-intel/vulnerabilities/id/74aad4b3-3e35-4abe-ba26-48334da0face?source=api-prod
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2022-35073
- CVE-2022-2839
- https://attackerkb.com/topics/CVE-2022-2839
- CWE-79
- CWE-352
- EUVD-EUVD-2022-35073
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.