cve/2022/CVE-2022-1112.md

19 lines
947 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-1112](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1112)
![](https://img.shields.io/static/v1?label=Product&message=Autolinks&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.0.1%3C%3D%201.0.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Autolinks WordPress plugin through 1.0.1 does not have CSRF check in place when updating its settings, and does not sanitise as well as escape them, which could allow attackers to perform Stored Cross-Site scripting against a logged in admin via a CSRF attack
### POC
#### Reference
- https://wpscan.com/vulnerability/746c7cf2-0902-461a-a364-285505d73505
#### Github
No PoCs found on GitHub currently.