WordPress GDPR & CCPA < 1.9.27 - Unauthenticated Reflected Cross-Site Scripting
CVE-2022-0220

6.1MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
1 February 2022

Summary

The check_privacy_settings AJAX action of the WordPress GDPR WordPress plugin before 1.9.27, available to both unauthenticated and authenticated users, responds with JSON data without an "application/json" content-type. Since an HTML payload isn't properly escaped, it may be interpreted by a web browser led to this endpoint. Javascript code may be executed on a victim's browser. Due to v1.9.26 adding a CSRF check, the XSS is only exploitable against unauthenticated users (as they all share the same nonce)

Affected Version(s)

WordPress GDPR 0 < 1.9.27

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ace Candelario (@0xspade)
Victor Paynat-Sautivet (3DS Outscale SOC)
WPScan
.