From 553b5d2f2315226f1f7417ed353731a0ff1804aa Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Mon, 25 Jul 2022 17:45:07 +0530 Subject: [PATCH] Update CVE-2022-0952.yaml --- cves/2022/CVE-2022-0952.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2022/CVE-2022-0952.yaml b/cves/2022/CVE-2022-0952.yaml index 5e11ad3a09..811d01bac4 100644 --- a/cves/2022/CVE-2022-0952.yaml +++ b/cves/2022/CVE-2022-0952.yaml @@ -6,7 +6,7 @@ info: severity: critical description: | The plugin does not have authorisation and CSRF checks when updating options via a REST endpoint, and does not ensure that the option to be updated belongs to the plugin - reference: + reference: - https://wpscan.com/vulnerability/0f694961-afab-44f9-846c-e80a0f6c768b metadata: verified: true