{"id":"CVE-2022-4822","details":"A vulnerability, which was classified as problematic, has been found in FlatPress. This issue affects some unknown processing of the file setup/lib/main.lib.php of the component Setup. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1. It is recommended to apply a patch to fix this issue. The identifier VDB-217001 was assigned to this vulnerability.","modified":"2026-04-10T04:53:01.934423Z","published":"2022-12-28T21:15:11.017Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?ctiid.217001"},{"type":"ADVISORY","url":"https://vuldb.com/?id.217001"},{"type":"FIX","url":"https://github.com/flatpressblog/flatpress/commit/5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1"},{"type":"FIX","url":"https://github.com/flatpressblog/flatpress/issues/176"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/flatpressblog/flatpress","events":[{"introduced":"0"},{"fixed":"5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1"}]},{"type":"GIT","repo":"https://github.com/flatpressblog/flatpress","events":[{"introduced":"0"},{"fixed":"5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1"}]}],"versions":["1.1","1.2","1.2.1","1.2.beta1","1.2.beta2","v1.0.2","v1.0.3","v1.0.3.php7"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-4822.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}