diff --git a/cves/2022/CVE-2022-0218.yaml b/cves/2022/CVE-2022-0218.yaml index 2d3a4389eb..c745bccfd6 100644 --- a/cves/2022/CVE-2022-0218.yaml +++ b/cves/2022/CVE-2022-0218.yaml @@ -3,13 +3,18 @@ id: CVE-2022-0218 info: name: HTML Email Template Designer < 3.1 - Stored Cross-Site Scripting (XSS) author: hexcat - severity: high + severity: medium description: WordPress Email Template Designer WP HTML Mail allows stored XSS through an unprotected REST-API endpoint (CVE-2022-0218). reference: - https://www.wordfence.com/blog/2022/01/unauthenticated-xss-vulnerability-patched-in-html-email-template-designer-plugin/ - https://wordpress.org/plugins/wp-html-mail/ - https://nvd.nist.gov/vuln/detail/CVE-2022-0218 tags: wordpress,wp-plugin,xss,cve,cve2022 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2022-0218 + cwe-id: CWE-79 requests: - method: GET diff --git a/cves/2022/CVE-2022-0432.yaml b/cves/2022/CVE-2022-0432.yaml index fe88c42fba..026d8781e7 100644 --- a/cves/2022/CVE-2022-0432.yaml +++ b/cves/2022/CVE-2022-0432.yaml @@ -10,6 +10,11 @@ info: - https://drive.google.com/file/d/1vpZ0CcmFhTEUasLTPUBf8o-4l7G6ojtG/view - https://nvd.nist.gov/vuln/detail/CVE-2022-0432 tags: cve,cve2022,mastodon,prototype + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.10 + cve-id: CVE-2022-0432 + cwe-id: CWE-1321 requests: - method: GET