cve/2022/CVE-2022-1617.md

19 lines
931 B
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-1617](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1617)
![](https://img.shields.io/static/v1?label=Product&message=WP-Invoice&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WP-Invoice WordPress plugin through 4.3.1 does not have CSRF check in place when updating its settings, and is lacking sanitisation as well as escaping in some of them, allowing attacker to make a logged in admin change them and add XSS payload in them
### POC
#### Reference
- https://wpscan.com/vulnerability/7e40e506-ad02-44ca-9d21-3634f3907aad/
#### Github
2024-08-08 18:49:29 +00:00
- https://github.com/20142995/nuclei-templates
2024-05-25 21:48:12 +02:00