cve/2022/CVE-2022-1001.md

18 lines
897 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-1001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1001)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Downgrade%20%7C%20Specific%20Core%20Version&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.2.3%3C%201.2.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WP Downgrade WordPress plugin before 1.2.3 only perform client side validation of its "WordPress Target Version" settings, but does not sanitise and escape it server side, allowing high privilege users such as admin to perform Cross-Site attacks even when the unfiltered_html capability is disallowed
### POC
#### Reference
- https://wpscan.com/vulnerability/34a7b3cd-e2b5-4891-ab33-af6a2a0eeceb
#### Github
- https://github.com/ARPSyndicate/cvemon