Rewterz
Rewterz Threat Alert – LockBit Ransomware – Active IOCs
May 29, 2023
Rewterz
Rewterz Threat Alert – Rhadamanthys Stealer – Active IOCs
May 29, 2023

Rewterz Threat Advisory – Multiple WordPress Plugin Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2022-47177 CVSS:4.3

WP EasyPay Plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to perform unauthorized actions. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.

CVE-2022-47174 CVSS:4.3

Performance Lab Plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to perform unauthorized actions. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.

CVE-2022-47178 CVSS:4.3

Simple Share Buttons Adder Plugin for WordPress is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to perform unauthorized actions. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.

Impact

  • Gain Access

Indicators Of Compromise

CVE

  • CVE-2022-47177
  • CVE-2022-47174
  • CVE-2022-47178

Affected Vendors

WordPress

Affected Products

  • Theme Tweaker Plugin for WordPress 5.20
  • WP EasyPay Plugin for WordPress 4.1
  • Performance Lab Plugin for WordPress 2.2.0
  • Simple Share Buttons Adder Plugin for WordPress 8.4.7

Remediation

Refer to Patcstack Website for patch, upgrade or suggested workaround information.

CVE-2022-47177

CVE-2022-47174

CVE-2022-47178