### [CVE-2022-0840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0840) ![](https://img.shields.io/static/v1?label=Product&message=Easy%20Social%20Icons&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.2.1%3C%203.2.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen) ### Description The Easy Social Icons WordPress plugin before 3.2.1 does not properly escape the image_file field when adding a new social icon, allowing high privileged users to inject arbitrary javascript even when the unfiltered_html capability is disallowed. ### POC #### Reference - https://wpscan.com/vulnerability/9da884a9-b4dd-4de0-9afa-722f772cf2df - https://wpscan.com/vulnerability/9da884a9-b4dd-4de0-9afa-722f772cf2df #### Github No PoCs found on GitHub currently.