.. / CVE-2022-1756

Exploit for Newsletter < 7.4.5 - Cross-Site Scripting (CVE-2022-1756)

Description:

The Newsletter WordPress plugin before 7.4.5 does not sanitize and escape the $_SERVER[‘REQUEST_URI’] before echoing it back in admin pages. Although this uses addslashes, and most modern browsers automatically URLEncode requests, this is still vulnerable to Reflected XSS in older browsers such as Internet Explorer 9 or below.

Nuclei Template

View the template here CVE-2022-1756.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-1756.yaml
Copy

References:

https://wpscan.com/vulnerability/6ad407fe-db2b-41fb-834b-dd8c4f62b072
https://github.com/ARPSyndicate/cvemon
https://wordpress.org/plugins/newsletter/
https://nvd.nist.gov/vuln/detail/CVE-2022-1756