{"vulnerability": "CVE-2022-4472", "sightings": [{"uuid": "2c216208-7521-4aa8-a78a-9c0511de9aff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://gist.github.com/Darkcrai86/0f80603a263e033f4c0501a6394db4b8", "content": "", "creation_timestamp": "2025-09-18T16:28:01.000000Z"}, {"uuid": "46f42b76-2a68-44e5-a909-e87899015aeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44729", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-261-04", "content": "", "creation_timestamp": "2025-09-18T10:00:00.000000Z"}, {"uuid": "400a8cca-1eb9-4221-ada9-06a644b9cfe2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44725", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13846", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44725\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: OPC Foundation Local Discovery Server (LDS) through 1.04.403.478 uses a hard-coded file path to a configuration file. This allows a normal user to create a malicious file that is loaded by LDS (running as a high-privilege user).\n\ud83d\udccf Published: 2022-11-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T14:47:56.883Z\n\ud83d\udd17 References:\n1. https://opcfoundation.org/developer-tools/samples-and-tools-unified-architecture/local-discovery-server-lds/\n2. https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-44725.pdf", "creation_timestamp": "2025-04-29T15:11:53.000000Z"}, {"uuid": "458e60d3-6dc9-43e1-bd25-4877d0cb92d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-44727", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/14286", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-44727\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The EU Cookie Law GDPR (Banner + Blocker) module before 2.1.3 for PrestaShop allows SQL Injection via a cookie ( lgcookieslaw or __lglaw ).\n\ud83d\udccf Published: 2022-11-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-01T14:01:49.423Z\n\ud83d\udd17 References:\n1. https://www.lineagrafica.es/modp/lgcookieslaw/en/readme_en.pdf\n2. https://addons.prestashop.com/en/legal/8734-eu-cookie-law-gdpr-banner-blocker.html\n3. https://securityandstuff.com/posts/cve-2022-44727/", "creation_timestamp": "2025-05-01T14:15:21.000000Z"}, {"uuid": "0db6e02b-0c36-42a0-bf31-00ac3a2e372e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4472", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9356", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4472\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Simple Sitemap WordPress plugin before 3.5.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.\n\ud83d\udccf Published: 2023-01-30T20:31:35.144Z\n\ud83d\udccf Modified: 2025-03-28T14:05:14.424Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/2b685a12-2ca3-42dd-84fe-4a463a082c2a", "creation_timestamp": "2025-03-28T14:27:41.000000Z"}]}