{ "id": "CVE-2022-1407", "sourceIdentifier": "contact@wpscan.com", "published": "2022-05-16T15:15:09.463", "lastModified": "2022-05-24T16:03:54.223", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The VikBooking Hotel Booking Engine & PMS WordPress plugin before 1.5.8 does not have CSRF check in place when adding a tracking campaign, and does not escape the campaign fields when outputting them In attributes. As a result, attackers could make a logged in admin add tracking campaign with XSS payloads in them via a CSRF attack" }, { "lang": "es", "value": "El plugin VikBooking Hotel Booking Engine & PMS de WordPress versiones anteriores a 1.5.8, no presenta una comprobaci\u00f3n de tipo CSRF cuando es a\u00f1adida una campa\u00f1a de seguimiento, y no escapa de los campos de la campa\u00f1a cuando los muestra en los atributos. Como resultado, los atacantes podr\u00edan hacer que un administrador conectado a\u00f1adiera una campa\u00f1a de seguimiento con cargas \u00fatiles de tipo XSS en ellos por medio de un ataque de tipo CSRF" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "contact@wpscan.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-352" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:vikwp:hotel_booking_engine_\\&_pms:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.5.8", "matchCriteriaId": "1A8EA3FF-E035-4AB8-9273-D20F1AAC403C" } ] } ] } ], "references": [ { "url": "https://wpscan.com/vulnerability/19a9e266-daf6-4cc5-a300-2b5436b6d07d", "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ] } ] }