cve/2022/CVE-2022-1009.md

18 lines
962 B
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-1009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1009)
![](https://img.shields.io/static/v1?label=Product&message=Smush%20%E2%80%93%20Lazy%20Load%20Images%2C%20Optimize%20%26%20Compress%20Images&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.9.9%3C%203.9.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Smush WordPress plugin before 3.9.9 does not sanitise and escape a configuration parameter before outputting it back in an admin page when uploading a malicious preset configuration, leading to a Reflected Cross-Site Scripting. For the attack to be successful, an attacker would need an admin to upload a malicious configuration file
### POC
#### Reference
- https://wpscan.com/vulnerability/bb5af08f-bb19-46a1-a7ac-8381f428c11e
#### Github
- https://github.com/ARPSyndicate/cvemon