The WP Blog and Widgets WordPress plugin before 2.3.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
{"id": "CVE-2022-4824", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2022-4824", "description": "The WP Blog and Widgets WordPress plugin before 2.3.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "published": "2023-02-06T20:15:00", "modified": "2023-02-13T20:14:00", "epss": [{"cve": "CVE-2022-4824", "epss": 0.00045, "percentile": 0.11954, "modified": "2023-06-03"}], "cvss": {"score": 4.9, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.9}, "severity": "MEDIUM", "exploitabilityScore": 6.8, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.3, "impactScore": 2.7}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4824", "reporter": "contact@wpscan.com", "references": ["https://wpscan.com/vulnerability/9af8e425-c477-4e2b-9445-70ffb769f3f0"], "cvelist": ["CVE-2022-4824"], "immutableFields": [], "lastseen": "2023-06-03T15:15:41", "viewCount": 16, "enchantments": {"dependencies": {"references": [{"type": "wpexploit", "idList": ["WPEX-ID:9AF8E425-C477-4E2B-9445-70FFB769F3F0"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:9AF8E425-C477-4E2B-9445-70FFB769F3F0"]}]}, "score": {"value": 1.9, "vector": "NONE"}, "affected_software": {"major_version": [{"name": "essentialplugin wp blog and widget", "version": 2}]}, "epss": [{"cve": "CVE-2022-4824", "epss": 0.00045, "percentile": 0.11932, "modified": "2023-05-02"}], "vulnersScore": 1.9}, "_state": {"dependencies": 1685838547, "score": 1685805531, "affected_software_major_version": 0, "epss": 0}, "_internal": {"score_hash": "64a7d043d68fca88363b49a6d39976fb"}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": [], "cpe23": [], "cwe": ["CWE-79"], "affectedSoftware": [{"cpeName": "essentialplugin:wp_blog_and_widget", "version": "2.3.1", "operator": "lt", "name": "essentialplugin wp blog and widget"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:essentialplugin:wp_blog_and_widget:2.3.1:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.3.1", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://wpscan.com/vulnerability/9af8e425-c477-4e2b-9445-70ffb769f3f0", "name": "https://wpscan.com/vulnerability/9af8e425-c477-4e2b-9445-70ffb769f3f0", "refsource": "MISC", "tags": ["Exploit", "Third Party Advisory"]}], "product_info": [{"vendor": "Unknown", "product": "WP Blog and Widgets"}], "solutions": [], "workarounds": [], "impacts": [], "problemTypes": [{"descriptions": [{"description": "CWE-79 Cross-Site Scripting (XSS)", "lang": "en", "type": "CWE"}]}], "exploits": [], "assigned": "1976-01-01T00:00:00"}
{"wpvulndb": [{"lastseen": "2023-05-11T20:40:22", "description": "The plugin does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. \n\n### PoC\n\nNote: First, you need to add a Blog Post at http://localhost/wp-admin/edit.php?post_type=blog_post Exploit shortcode: [recent_blog_post grid='1\" onmouseover=\"alert(1)\"']\n", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2023-01-12T00:00:00", "type": "wpvulndb", "title": "WP Blog and Widget < 2.3.1 - Contributor+ Stored XSS via Shortcode", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2022-4824"], "modified": "2023-01-12T06:20:38", "id": "WPVDB-ID:9AF8E425-C477-4E2B-9445-70FFB769F3F0", "href": "https://wpscan.com/vulnerability/9af8e425-c477-4e2b-9445-70ffb769f3f0", "sourceData": "", "cvss": {"score": 0.0, "vector": "NONE"}}], "wpexploit": [{"lastseen": "2023-05-11T20:40:22", "description": "The plugin does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. \n", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2023-01-12T00:00:00", "type": "wpexploit", "title": "WP Blog and Widget < 2.3.1 - Contributor+ Stored XSS via Shortcode", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2022-4824"], "modified": "2023-01-12T06:20:38", "id": "WPEX-ID:9AF8E425-C477-4E2B-9445-70FFB769F3F0", "href": "", "sourceData": "Note: First, you need to add a Blog Post at http://localhost/wp-admin/edit.php?post_type=blog_post\r\n\r\nExploit shortcode:\r\n\r\n[recent_blog_post grid='1\" onmouseover=\"alert(1)\"']", "cvss": {"score": 0.0, "vector": "NONE"}}], "prion": [{"lastseen": "2023-08-15T23:52:26", "description": "The WP Blog and Widgets WordPress plugin before 2.3.1 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2023-02-06T20:15:00", "type": "prion", "title": "CVE-2022-4824", "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.9, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 4.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-4824"], "modified": "2023-02-13T20:14:00", "id": "PRION:CVE-2022-4824", "href": "https://kb.prio-n.com/vulnerability/CVE-2022-4824", "cvss": {"score": 4.9, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:N"}}]}