cve/2022/CVE-2022-4209.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-4209](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4209)
![](https://img.shields.io/static/v1?label=Product&message=Chained%20Quiz&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20*%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
The Chained Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'pointsf' parameter on the 'chainedquiz_list' page in versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
### POC
#### Reference
- https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
2024-06-09 00:33:16 +00:00
- https://gist.github.com/Xib3rR4dAr/417a11bcb9b8da28cfe5ba1c17c44d0e
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.