CVE-2022-1750: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in numixtech Sticky Popup
The Sticky Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘ popup_title' parameter in versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with admin level capabilities and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This issue mostly affects sites where unfiltered_html has been disabled for administrators and on multi-site installations where unfiltered_html is disabled for administrators.
AI Analysis
Technical Summary
CVE-2022-1750 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Sticky Popup WordPress plugin developed by numixtech, specifically in versions up to and including 1.2. The vulnerability arises due to improper neutralization of input during web page generation, classified under CWE-79. The root cause is insufficient input sanitization and output escaping of the 'popup_title' parameter. This flaw allows authenticated users with administrator-level privileges or higher to inject arbitrary JavaScript code into pages generated by the plugin. When other users access these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or other malicious activities. The vulnerability is particularly relevant in environments where the WordPress 'unfiltered_html' capability is disabled for administrators, such as multi-site installations or hardened setups that restrict direct HTML input. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with an attack vector of network (remote), low attack complexity, requiring high privileges (admin), no user interaction, and with a scope change. No known exploits have been reported in the wild, and no official patches or updates have been linked in the provided data. The vulnerability's impact is limited by the requirement for administrative privileges to exploit it, but the scope change indicates that the injected script can affect other users beyond the attacker, increasing the risk in multi-user environments.
Potential Impact
For European organizations using WordPress sites with the Sticky Popup plugin, this vulnerability poses a risk primarily in environments with multiple users or administrators, such as corporate intranets, e-commerce platforms, or public-facing websites with administrative user roles. Successful exploitation could lead to the execution of malicious scripts in the browsers of site visitors or other administrators, potentially resulting in session hijacking, theft of sensitive data, or unauthorized actions performed on behalf of legitimate users. This could undermine the confidentiality and integrity of web applications and user data. Given the requirement for administrative access to exploit, the threat is more significant in organizations with weak internal access controls or compromised administrator accounts. The vulnerability could also be leveraged as part of a broader attack chain, especially in multi-site WordPress installations common in large European enterprises or hosting providers. The lack of known exploits reduces immediate risk, but the presence of the vulnerability in a widely used CMS plugin means that targeted attacks or automated scanning could emerge, especially in sectors with high-value targets such as finance, healthcare, or government institutions in Europe.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Immediately audit WordPress installations to identify the presence of the Sticky Popup plugin, especially versions up to 1.2. 2) Restrict administrative privileges strictly to trusted personnel and implement strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 3) If possible, disable or limit the use of the Sticky Popup plugin until a patched version is available or consider replacing it with alternative plugins that have been audited for security. 4) Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites, mitigating the impact of potential XSS attacks. 5) Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 6) Educate administrators about the risks of injecting untrusted content and the importance of sanitizing inputs. 7) For multi-site WordPress installations, review and adjust the 'unfiltered_html' capability settings to balance functionality and security. 8) Stay updated with vendor advisories and apply patches promptly once released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2022-1750: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in numixtech Sticky Popup
Description
The Sticky Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘ popup_title' parameter in versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with admin level capabilities and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This issue mostly affects sites where unfiltered_html has been disabled for administrators and on multi-site installations where unfiltered_html is disabled for administrators.
AI-Powered Analysis
Technical Analysis
CVE-2022-1750 is a medium-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Sticky Popup WordPress plugin developed by numixtech, specifically in versions up to and including 1.2. The vulnerability arises due to improper neutralization of input during web page generation, classified under CWE-79. The root cause is insufficient input sanitization and output escaping of the 'popup_title' parameter. This flaw allows authenticated users with administrator-level privileges or higher to inject arbitrary JavaScript code into pages generated by the plugin. When other users access these compromised pages, the injected scripts execute in their browsers, potentially leading to session hijacking, privilege escalation, or other malicious activities. The vulnerability is particularly relevant in environments where the WordPress 'unfiltered_html' capability is disabled for administrators, such as multi-site installations or hardened setups that restrict direct HTML input. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with an attack vector of network (remote), low attack complexity, requiring high privileges (admin), no user interaction, and with a scope change. No known exploits have been reported in the wild, and no official patches or updates have been linked in the provided data. The vulnerability's impact is limited by the requirement for administrative privileges to exploit it, but the scope change indicates that the injected script can affect other users beyond the attacker, increasing the risk in multi-user environments.
Potential Impact
For European organizations using WordPress sites with the Sticky Popup plugin, this vulnerability poses a risk primarily in environments with multiple users or administrators, such as corporate intranets, e-commerce platforms, or public-facing websites with administrative user roles. Successful exploitation could lead to the execution of malicious scripts in the browsers of site visitors or other administrators, potentially resulting in session hijacking, theft of sensitive data, or unauthorized actions performed on behalf of legitimate users. This could undermine the confidentiality and integrity of web applications and user data. Given the requirement for administrative access to exploit, the threat is more significant in organizations with weak internal access controls or compromised administrator accounts. The vulnerability could also be leveraged as part of a broader attack chain, especially in multi-site WordPress installations common in large European enterprises or hosting providers. The lack of known exploits reduces immediate risk, but the presence of the vulnerability in a widely used CMS plugin means that targeted attacks or automated scanning could emerge, especially in sectors with high-value targets such as finance, healthcare, or government institutions in Europe.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Immediately audit WordPress installations to identify the presence of the Sticky Popup plugin, especially versions up to 1.2. 2) Restrict administrative privileges strictly to trusted personnel and implement strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 3) If possible, disable or limit the use of the Sticky Popup plugin until a patched version is available or consider replacing it with alternative plugins that have been audited for security. 4) Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts on affected sites, mitigating the impact of potential XSS attacks. 5) Monitor logs and user activity for unusual behavior indicative of exploitation attempts. 6) Educate administrators about the risks of injecting untrusted content and the importance of sanitizing inputs. 7) For multi-site WordPress installations, review and adjust the 'unfiltered_html' capability settings to balance functionality and security. 8) Stay updated with vendor advisories and apply patches promptly once released.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2022-05-16T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbcd7
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 10:56:16 PM
Last updated: 7/26/2025, 6:13:58 PM
Views: 13
Related Threats
CVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighCVE-2025-40768: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens SINEC Traffic Analyzer
HighCVE-2025-40767: CWE-250: Execution with Unnecessary Privileges in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.