### [CVE-2022-0402](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0402) ![](https://img.shields.io/static/v1?label=Product&message=Super%20Forms%20-%20Drag%20%26%20Drop%20Form%20Builder&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%206.0.4%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen) ### Description The Super Forms - Drag & Drop Form Builder WordPress plugin before 6.0.4 does not escape the bob_czy_panstwa_sprawa_zostala_rozwiazana parameter before outputting it back in an attribute via the super_language_switcher AJAX action, leading to a Reflected Cross-Site Scripting. The action is also lacking CSRF, making the attack easier to perform against any user. ### POC #### Reference - https://wpscan.com/vulnerability/2e2e2478-2488-4c91-8af8-69b07783854f/ #### Github No PoCs found on GitHub currently.