Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2022-1756 β€” Cross-site Scripting in Newsletter

Severity
6.1MEDIUMNVD
EPSS
3.1%
top 13.12%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 13
Latest updateJun 14

Description

The Newsletter WordPress plugin before 7.4.5 does not sanitize and escape the $_SERVER['REQUEST_URI'] before echoing it back in admin pages. Although this uses addslashes, and most modern browsers automatically URLEncode requests, this is still vulnerable to Reflected XSS in older browsers such as Internet Explorer 9 or below.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages1 packages

πŸ”΄Vulnerability Details

2
GHSA
GHSA-mg6c-vwvq-75r2: The Newsletter WordPress plugin before 7β†—2022-06-14
β–Ά
CVEList
Newsletter < 7.4.5 - Reflected Cross-Site Scripting↗2022-06-13
β–Ά

πŸ’₯Exploits & PoCs

1
Nuclei
Newsletter < 7.4.5 - Cross-Site Scripting
β–Ά
CVE-2022-1756 β€” Cross-site Scripting in Newsletter | cvebase