Unauthenticated XSS vulnerability in WordPress GDPR < 1.9.27 allows execution of malicious code. Update to version 1.9.27 to prevent exploitation.
WordPress GDPR & CCPA < 1.9.27 - Unauthenticated Reflected Cross-Site Scripting.
Understanding CVE-2022-0220
This CVE refers to an unauthenticated reflected cross-site scripting vulnerability in the WordPress GDPR plugin version less than 1.9.27.
What is CVE-2022-0220?
The vulnerability exists in the check_privacy_settings AJAX action of the WordPress GDPR plugin. It allows both unauthenticated and authenticated users to execute malicious Javascript code on a victim's browser through improperly escaped HTML payloads.
The Impact of CVE-2022-0220
This vulnerability could lead to the execution of arbitrary code on the victim's browser, potentially resulting in unauthorized access to sensitive information or further attacks.
Technical Details of CVE-2022-0220
Vulnerability Description
The issue arises due to the plugin responding with JSON data without the proper "application/json" content-type and lack of proper HTML payload escaping.
Affected Systems and Versions
The vulnerability affects versions of the WordPress GDPR plugin that are less than 1.9.27.
Exploitation Mechanism
Since version 1.9.26 added a CSRF check, the cross-site scripting (XSS) is only exploitable against unauthenticated users, as they share the same nonce.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Refer to the WPScan website for detailed information on the vulnerability and steps to apply patches.