Security for everyone

CVE-2022-30073 Scanner

Detects 'Cross-Site Scripting (XSS)' vulnerability in WBCE CMS affects v. 1.5.2.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2022-30073 Scanner Detail

WBCE CMS is a popular open-source content management system that is widely used for building websites and web applications. It is a flexible and easy-to-use platform that enables web developers to manage the content of their websites efficiently. This platform is equipped with various features such as drag-and-drop page builder, image manager, user management, and more.

One of the recent security vulnerabilities that have been detected in the WBCE CMS is identified as CVE-2022-30073. This vulnerability is related to Cross Site Scripting (XSS) and can allow attackers to inject malicious scripts into web pages that are viewed by unsuspecting users. This can result in the theft of sensitive data such as login credentials, credit card information, and other personal information of users.

If exploited, CVE-2022-30073 can lead to serious consequences such as data breaches, financial losses, reputation damage, and legal repercussions. Hackers can use the vulnerability to gain unauthorized access to the website and steal sensitive data, install malware, initiate phishing attacks, and engage in other malicious activities. This vulnerability, when exploited, can lead to a negative impact on the business' online presence and revenue stream.

Thanks to the pro features of the platform, you can easily and quickly learn about vulnerabilities in your digital assets, including CMS, website, and web applications. With our comprehensive vulnerability scanning and security assessment services, you can rest assured that your digital assets are protected against the latest threats in the cybersecurity landscape. Don't wait until it's too late, take action now to secure your online presence with



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture