{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T07:01:10.456","vulnerabilities":[{"cve":{"id":"CVE-2022-4600","sourceIdentifier":"cna@vuldb.com","published":"2022-12-18T11:15:10.820","lastModified":"2024-11-21T07:35:34.457","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability was found in Shoplazza LifeStyle 1.1. It has been classified as problematic. This affects an unknown part of the file /admin/api/theme-edit/ of the component Product Carousel Handler. The manipulation of the argument Heading/Description leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-216195."},{"lang":"es","value":"Se encontró una vulnerabilidad en Shoplazza LifeStyle 1.1. Ha sido clasificada como problemática. Esta afecta a una parte desconocida del archivo /admin/api/theme-edit/ del componente Product Carousel Handler. La manipulación del argumento Heading/Description conduce a Cross-Site Scripting. Es posible iniciar el ataque de forma remota. La explotación ha sido divulgada al público y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-216195."}],"metrics":{"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseScore":3.5,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"cna@vuldb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-707"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:shoplazza:lifestyle:1.1:*:*:*:*:shoplazza:*:*","matchCriteriaId":"F7D59C85-92F3-4528-A092-7E616145D879"}]}]}],"references":[{"url":"https://seclists.org/fulldisclosure/2022/Dec/11","source":"cna@vuldb.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt","source":"cna@vuldb.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://vuldb.com/?id.216195","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://seclists.org/fulldisclosure/2022/Dec/11","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://seclists.org/fulldisclosure/2022/Dec/att-11/proof-of-concept-shoplazza.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://vuldb.com/?id.216195","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}