{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T07:47:21.494","vulnerabilities":[{"cve":{"id":"CVE-2022-4524","sourceIdentifier":"cna@vuldb.com","published":"2022-12-15T21:15:13.017","lastModified":"2024-11-21T07:35:25.823","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in Roots soil Plugin up to 4.0.x. Affected is the function language_attributes of the file src/Modules/CleanUpModule.php. The manipulation of the argument language leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 4.1.0 is able to address this issue. The name of the patch is 0c9151e00ab047da253e5cdbfccb204dd423269d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215904."},{"lang":"es","value":"Una vulnerabilidad clasificada como problemática fue encontrada en Roots soil Plugin hasta 4.0.x. La función language_attributes del archivo src/Modules/CleanUpModule.php es afectada por la vulnerabilidad. La manipulación del argumento language conduce a Cross-Site Scripting. Es posible lanzar el ataque de forma remota. La actualización a la versión 4.1.0 puede solucionar este problema. El nombre del parche es 0c9151e00ab047da253e5cdbfccb204dd423269d. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-215904."}],"metrics":{"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseScore":3.5,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"cna@vuldb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:roots:soil:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"4.1.0","matchCriteriaId":"71313562-2AE8-4D62-9CAE-D30C005B038A"}]}]}],"references":[{"url":"https://github.com/roots/soil/commit/0c9151e00ab047da253e5cdbfccb204dd423269d","source":"cna@vuldb.com","tags":["Patch"]},{"url":"https://github.com/roots/soil/pull/285","source":"cna@vuldb.com","tags":["Patch"]},{"url":"https://github.com/roots/soil/releases/tag/4.1.0","source":"cna@vuldb.com","tags":["Release Notes"]},{"url":"https://vuldb.com/?id.215904","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://github.com/roots/soil/commit/0c9151e00ab047da253e5cdbfccb204dd423269d","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/roots/soil/pull/285","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/roots/soil/releases/tag/4.1.0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://vuldb.com/?id.215904","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}