CVE-2022-3402 (GCVE-0-2022-3402)
Vulnerability from cvelistv5 – Published: 2022-10-28 18:57 – Updated: 2025-01-31 18:46
VLAI?
Summary
The Log HTTP Requests plugin for WordPress is vulnerable to Stored Cross-Site Scripting via logged HTTP requests in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers who can trick a site's administrator into performing an action like clicking on a link, or an authenticated user with access to a page that sends a request using user-supplied data via the server, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity ?
6.1 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| mgibbs189 | Log HTTP Requests |
Affected:
* , ≤ 1.3.1
(semver)
|
Credits
Etan Imanol Castro Aldrete
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:07:06.641Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=2770821%40log-http-requests\u0026new=2770821%40log-http-requests\u0026sfp_email=\u0026sfph_mail="
},
{
"tags": [
"x_transferred"
],
"url": "https://wordpress.org/plugins/log-http-requests/#developers"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3402"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-3402",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-31T18:46:50.696022Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-31T18:46:55.068Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Log HTTP Requests",
"vendor": "mgibbs189",
"versions": [
{
"lessThanOrEqual": "1.3.1",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Etan Imanol Castro Aldrete"
}
],
"descriptions": [
{
"lang": "en",
"value": "The Log HTTP Requests plugin for WordPress is vulnerable to Stored Cross-Site Scripting via logged HTTP requests in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers who can trick a site\u0027s administrator into performing an action like clicking on a link, or an authenticated user with access to a page that sends a request using user-supplied data via the server, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/A:N/I:L/C:L/S:C/UI:R/PR:N/AC:L/AV:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-10-28T18:57:41.609Z",
"orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"shortName": "Wordfence"
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=2770821%40log-http-requests\u0026new=2770821%40log-http-requests\u0026sfp_email=\u0026sfph_mail="
},
{
"url": "https://wordpress.org/plugins/log-http-requests/#developers"
},
{
"url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3402"
}
],
"timeline": [
{
"lang": "en",
"time": "2022-10-05T00:00:00.000+00:00",
"value": "Disclosed"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"assignerShortName": "Wordfence",
"cveId": "CVE-2022-3402",
"datePublished": "2022-10-28T18:57:41.609Z",
"dateReserved": "2022-10-03T15:20:35.618Z",
"dateUpdated": "2025-01-31T18:46:55.068Z",
"requesterUserId": "8d345d3f-a59e-4410-a440-fac6e918fcfc",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:facetwp:log_http_requests:*:*:*:*:*:wordpress:*:*\", \"versionEndExcluding\": \"1.3.2\", \"matchCriteriaId\": \"694404FF-7E7E-4837-A838-F64AF9119A5F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The Log HTTP Requests plugin for WordPress is vulnerable to Stored Cross-Site Scripting via logged HTTP requests in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers who can trick a site\u0027s administrator into performing an action like clicking on a link, or an authenticated user with access to a page that sends a request using user-supplied data via the server, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\"}, {\"lang\": \"es\", \"value\": \"El complemento Log HTTP Requests para WordPress es vulnerable a Stored Cross-Site Scripting a trav\\u00e9s de solicitudes HTTP registradas en versiones hasta la 1.3.1 inclusive debido a una sanitizaci\\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados que pueden enga\\u00f1ar al administrador de un sitio para que realice una acci\\u00f3n como hacer clic en un enlace, o a un usuario autenticado con acceso a una p\\u00e1gina que env\\u00eda una solicitud utilizando datos proporcionados por el usuario a trav\\u00e9s del servidor, inyecten scripts web arbitrarios en p\\u00e1ginas que se ejecutar\\u00e1n cada vez que un usuario acceda a una p\\u00e1gina inyectada.\"}]",
"id": "CVE-2022-3402",
"lastModified": "2024-11-21T07:19:27.050",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security@wordfence.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}]}",
"published": "2022-10-28T19:15:09.857",
"references": "[{\"url\": \"https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=2770821%40log-http-requests\u0026new=2770821%40log-http-requests\u0026sfp_email=\u0026sfph_mail=\", \"source\": \"security@wordfence.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://wordpress.org/plugins/log-http-requests/#developers\", \"source\": \"security@wordfence.com\", \"tags\": [\"Product\", \"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3402\", \"source\": \"security@wordfence.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=2770821%40log-http-requests\u0026new=2770821%40log-http-requests\u0026sfp_email=\u0026sfph_mail=\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://wordpress.org/plugins/log-http-requests/#developers\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Product\", \"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3402\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "security@wordfence.com",
"vulnStatus": "Modified"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-3402\",\"sourceIdentifier\":\"security@wordfence.com\",\"published\":\"2022-10-28T19:15:09.857\",\"lastModified\":\"2024-11-21T07:19:27.050\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Log HTTP Requests plugin for WordPress is vulnerable to Stored Cross-Site Scripting via logged HTTP requests in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers who can trick a site\u0027s administrator into performing an action like clicking on a link, or an authenticated user with access to a page that sends a request using user-supplied data via the server, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\"},{\"lang\":\"es\",\"value\":\"El complemento Log HTTP Requests para WordPress es vulnerable a Stored Cross-Site Scripting a trav\u00e9s de solicitudes HTTP registradas en versiones hasta la 1.3.1 inclusive debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados que pueden enga\u00f1ar al administrador de un sitio para que realice una acci\u00f3n como hacer clic en un enlace, o a un usuario autenticado con acceso a una p\u00e1gina que env\u00eda una solicitud utilizando datos proporcionados por el usuario a trav\u00e9s del servidor, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@wordfence.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:facetwp:log_http_requests:*:*:*:*:*:wordpress:*:*\",\"versionEndExcluding\":\"1.3.2\",\"matchCriteriaId\":\"694404FF-7E7E-4837-A838-F64AF9119A5F\"}]}]}],\"references\":[{\"url\":\"https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=2770821%40log-http-requests\u0026new=2770821%40log-http-requests\u0026sfp_email=\u0026sfph_mail=\",\"source\":\"security@wordfence.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://wordpress.org/plugins/log-http-requests/#developers\",\"source\":\"security@wordfence.com\",\"tags\":[\"Product\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3402\",\"source\":\"security@wordfence.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=2770821%40log-http-requests\u0026new=2770821%40log-http-requests\u0026sfp_email=\u0026sfph_mail=\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://wordpress.org/plugins/log-http-requests/#developers\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3402\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"b15e7b5b-3da4-40ae-a43c-f7aa60e62599\", \"shortName\": \"Wordfence\", \"dateUpdated\": \"2022-10-28T18:57:41.609Z\"}, \"affected\": [{\"vendor\": \"mgibbs189\", \"product\": \"Log HTTP Requests\", \"versions\": [{\"version\": \"*\", \"status\": \"affected\", \"lessThanOrEqual\": \"1.3.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The Log HTTP Requests plugin for WordPress is vulnerable to Stored Cross-Site Scripting via logged HTTP requests in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers who can trick a site\u0027s administrator into performing an action like clicking on a link, or an authenticated user with access to a page that sends a request using user-supplied data via the server, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.\"}], \"references\": [{\"url\": \"https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=2770821%40log-http-requests\u0026new=2770821%40log-http-requests\u0026sfp_email=\u0026sfph_mail=\"}, {\"url\": \"https://wordpress.org/plugins/log-http-requests/#developers\"}, {\"url\": \"https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3402\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/A:N/I:L/C:L/S:C/UI:R/PR:N/AC:L/AV:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\"}}], \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Etan Imanol Castro Aldrete\"}], \"timeline\": [{\"time\": \"2022-10-05T00:00:00.000+00:00\", \"lang\": \"en\", \"value\": \"Disclosed\"}]}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T01:07:06.641Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=2770821%40log-http-requests\u0026new=2770821%40log-http-requests\u0026sfp_email=\u0026sfph_mail=\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://wordpress.org/plugins/log-http-requests/#developers\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3402\", \"tags\": [\"x_transferred\"]}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-3402\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-31T18:46:50.696022Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-31T18:46:46.480Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2022-3402\", \"assignerOrgId\": \"b15e7b5b-3da4-40ae-a43c-f7aa60e62599\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"Wordfence\", \"requesterUserId\": \"8d345d3f-a59e-4410-a440-fac6e918fcfc\", \"dateReserved\": \"2022-10-03T15:20:35.618Z\", \"datePublished\": \"2022-10-28T18:57:41.609Z\", \"dateUpdated\": \"2025-01-31T18:46:55.068Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…