CVE-2022-2001: CWE-352 Cross-Site Request Forgery (CSRF) in nofearinc DX Share Selection
The DX Share Selection plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.4. This is due to missing nonce protection on the dxss_admin_page() function found in the ~/dx-share-selection.php file. This makes it possible for unauthenticated attackers to inject malicious web scripts into the page, granted they can trick a site's administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2022-2001 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the DX Share Selection plugin for WordPress, developed by nofearinc. This vulnerability exists in all versions up to and including 1.4 due to the absence of nonce protection in the dxss_admin_page() function located in the ~/dx-share-selection.php file. Nonce tokens are a critical security mechanism used to verify that requests made to a web application are intentional and originate from authenticated users. Without this protection, an attacker can craft malicious web requests that, when executed by an authenticated administrator (for example, by clicking a specially crafted link), cause unauthorized actions to be performed on the WordPress site. The vulnerability allows unauthenticated attackers to inject malicious scripts or commands indirectly by exploiting the administrator’s session, potentially leading to full compromise of the site’s confidentiality, integrity, and availability. The CVSS 3.1 base score of 8.8 reflects the high impact and ease of exploitation since no privileges are required and only user interaction (clicking a link) is necessary. Although no known exploits are currently reported in the wild, the vulnerability’s nature and severity make it a significant risk, especially for sites using this plugin without updated patches or mitigations. The attack vector is network-based, requiring only that the attacker trick an administrator into performing an action, which is a common social engineering tactic. The scope of the vulnerability is limited to sites using the DX Share Selection plugin, but the impact on those sites can be severe, including unauthorized administrative actions, data manipulation, or site defacement.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, particularly for those relying on WordPress sites with the DX Share Selection plugin installed. Successful exploitation could lead to unauthorized administrative control, enabling attackers to alter website content, inject malicious code, steal sensitive data, or disrupt services. This can damage organizational reputation, lead to data breaches involving personal or customer data protected under GDPR, and cause operational downtime. Given the high CVSS score and the fact that exploitation requires only user interaction without authentication, attackers could leverage phishing or social engineering campaigns targeting site administrators. The impact is especially critical for sectors with high web presence such as e-commerce, media, government, and education institutions across Europe. Furthermore, compromised websites can be used as platforms for further attacks, including distribution of malware or launching attacks against other internal systems, amplifying the threat to European organizations.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify if their WordPress installations use the DX Share Selection plugin and identify the version in use. If the plugin is present and running version 1.4 or earlier, it is imperative to update to a patched version once available or remove the plugin if no update exists. In the absence of an official patch, organizations should implement compensating controls such as restricting administrative access to trusted networks or IP addresses, enforcing multi-factor authentication (MFA) for administrators, and educating administrators about phishing and social engineering risks to reduce the likelihood of clicking malicious links. Additionally, implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting the vulnerable function can provide an additional layer of defense. Regularly monitoring administrative actions and audit logs for unusual activity can help detect exploitation attempts early. Finally, ensuring that WordPress core and all plugins are kept up to date and conducting periodic security assessments will help prevent exploitation of similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-2001: CWE-352 Cross-Site Request Forgery (CSRF) in nofearinc DX Share Selection
Description
The DX Share Selection plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.4. This is due to missing nonce protection on the dxss_admin_page() function found in the ~/dx-share-selection.php file. This makes it possible for unauthenticated attackers to inject malicious web scripts into the page, granted they can trick a site's administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2022-2001 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting the DX Share Selection plugin for WordPress, developed by nofearinc. This vulnerability exists in all versions up to and including 1.4 due to the absence of nonce protection in the dxss_admin_page() function located in the ~/dx-share-selection.php file. Nonce tokens are a critical security mechanism used to verify that requests made to a web application are intentional and originate from authenticated users. Without this protection, an attacker can craft malicious web requests that, when executed by an authenticated administrator (for example, by clicking a specially crafted link), cause unauthorized actions to be performed on the WordPress site. The vulnerability allows unauthenticated attackers to inject malicious scripts or commands indirectly by exploiting the administrator’s session, potentially leading to full compromise of the site’s confidentiality, integrity, and availability. The CVSS 3.1 base score of 8.8 reflects the high impact and ease of exploitation since no privileges are required and only user interaction (clicking a link) is necessary. Although no known exploits are currently reported in the wild, the vulnerability’s nature and severity make it a significant risk, especially for sites using this plugin without updated patches or mitigations. The attack vector is network-based, requiring only that the attacker trick an administrator into performing an action, which is a common social engineering tactic. The scope of the vulnerability is limited to sites using the DX Share Selection plugin, but the impact on those sites can be severe, including unauthorized administrative actions, data manipulation, or site defacement.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, particularly for those relying on WordPress sites with the DX Share Selection plugin installed. Successful exploitation could lead to unauthorized administrative control, enabling attackers to alter website content, inject malicious code, steal sensitive data, or disrupt services. This can damage organizational reputation, lead to data breaches involving personal or customer data protected under GDPR, and cause operational downtime. Given the high CVSS score and the fact that exploitation requires only user interaction without authentication, attackers could leverage phishing or social engineering campaigns targeting site administrators. The impact is especially critical for sectors with high web presence such as e-commerce, media, government, and education institutions across Europe. Furthermore, compromised websites can be used as platforms for further attacks, including distribution of malware or launching attacks against other internal systems, amplifying the threat to European organizations.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify if their WordPress installations use the DX Share Selection plugin and identify the version in use. If the plugin is present and running version 1.4 or earlier, it is imperative to update to a patched version once available or remove the plugin if no update exists. In the absence of an official patch, organizations should implement compensating controls such as restricting administrative access to trusted networks or IP addresses, enforcing multi-factor authentication (MFA) for administrators, and educating administrators about phishing and social engineering risks to reduce the likelihood of clicking malicious links. Additionally, implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting the vulnerable function can provide an additional layer of defense. Regularly monitoring administrative actions and audit logs for unusual activity can help detect exploitation attempts early. Finally, ensuring that WordPress core and all plugins are kept up to date and conducting periodic security assessments will help prevent exploitation of similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2022-06-06T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdc171
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/5/2025, 9:57:02 PM
Last updated: 7/30/2025, 12:47:44 AM
Views: 11
Related Threats
CVE-2025-9013: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9012: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9011: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9010: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9009: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.