CVE-2022-2654: CWE-79 Cross-Site Scripting (XSS) in Unknown Classified Listing – Classified ads & Business Directory Plugin
The Classima WordPress theme before 2.1.11 and some of its required plugins (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20 and Classima Core before 1.10) do not escape a parameter before outputting it back in attributes, leading to Reflected Cross-Site Scripting
AI Analysis
Technical Summary
CVE-2022-2654 is a reflected Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Classified Listing – Classified ads & Business Directory Plugin and related components of the Classima WordPress theme prior to specified versions (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20, and Classima Core before 1.10). The vulnerability arises because these versions fail to properly escape user-supplied input parameters before reflecting them back into HTML attributes. This improper sanitization allows an attacker to inject malicious JavaScript code into the web page, which is then executed in the context of the victim's browser when they interact with the affected page. The vulnerability is exploitable remotely without authentication (AV:N/AC:L/PR:N), but requires user interaction (UI:R), such as clicking a crafted link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact includes limited confidentiality and integrity loss (C:L/I:L), but no impact on availability (A:N). The CVSS v3.1 base score is 6.1, indicating a medium severity level. No known exploits in the wild have been reported to date. The vulnerability is specific to WordPress sites using the affected Classima theme and plugins, which are typically used to create classified ads and business directory websites. Attackers could leverage this vulnerability to steal session cookies, perform actions on behalf of authenticated users, or redirect users to malicious sites, potentially leading to account compromise or phishing attacks.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and local businesses relying on WordPress-based classified ads or business directory websites, this vulnerability poses a tangible risk. Exploitation could lead to theft of user credentials or session tokens, enabling attackers to impersonate legitimate users or administrators. This can result in unauthorized access to sensitive business information or customer data, violating GDPR requirements and leading to regulatory penalties. Additionally, successful XSS attacks can damage brand reputation and erode customer trust. Since many European businesses use WordPress due to its ease of use and cost-effectiveness, the attack surface is significant. Furthermore, sectors such as real estate, local commerce, and service providers that use classified ads platforms are particularly vulnerable. The reflected nature of the XSS means attackers must entice users to click malicious links, which could be distributed via email or social media, increasing the risk of targeted phishing campaigns within European markets.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Classima theme and all related plugins to versions 2.1.11 or later for the theme, and 2.2.14 or later for Classified Listing plugins, where the issue has been fixed. If updates are not immediately possible, implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns that attempt to inject scripts into URL parameters or form inputs. Additionally, site administrators should enforce Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. Regular security audits and penetration testing focusing on input validation and output encoding should be conducted. Educating users about the risks of clicking unknown links can also reduce the likelihood of successful exploitation. Finally, monitoring web server logs for unusual query parameters or repeated suspicious requests can help detect attempted exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2022-2654: CWE-79 Cross-Site Scripting (XSS) in Unknown Classified Listing – Classified ads & Business Directory Plugin
Description
The Classima WordPress theme before 2.1.11 and some of its required plugins (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20 and Classima Core before 1.10) do not escape a parameter before outputting it back in attributes, leading to Reflected Cross-Site Scripting
AI-Powered Analysis
Technical Analysis
CVE-2022-2654 is a reflected Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Classified Listing – Classified ads & Business Directory Plugin and related components of the Classima WordPress theme prior to specified versions (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20, and Classima Core before 1.10). The vulnerability arises because these versions fail to properly escape user-supplied input parameters before reflecting them back into HTML attributes. This improper sanitization allows an attacker to inject malicious JavaScript code into the web page, which is then executed in the context of the victim's browser when they interact with the affected page. The vulnerability is exploitable remotely without authentication (AV:N/AC:L/PR:N), but requires user interaction (UI:R), such as clicking a crafted link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact includes limited confidentiality and integrity loss (C:L/I:L), but no impact on availability (A:N). The CVSS v3.1 base score is 6.1, indicating a medium severity level. No known exploits in the wild have been reported to date. The vulnerability is specific to WordPress sites using the affected Classima theme and plugins, which are typically used to create classified ads and business directory websites. Attackers could leverage this vulnerability to steal session cookies, perform actions on behalf of authenticated users, or redirect users to malicious sites, potentially leading to account compromise or phishing attacks.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and local businesses relying on WordPress-based classified ads or business directory websites, this vulnerability poses a tangible risk. Exploitation could lead to theft of user credentials or session tokens, enabling attackers to impersonate legitimate users or administrators. This can result in unauthorized access to sensitive business information or customer data, violating GDPR requirements and leading to regulatory penalties. Additionally, successful XSS attacks can damage brand reputation and erode customer trust. Since many European businesses use WordPress due to its ease of use and cost-effectiveness, the attack surface is significant. Furthermore, sectors such as real estate, local commerce, and service providers that use classified ads platforms are particularly vulnerable. The reflected nature of the XSS means attackers must entice users to click malicious links, which could be distributed via email or social media, increasing the risk of targeted phishing campaigns within European markets.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Classima theme and all related plugins to versions 2.1.11 or later for the theme, and 2.2.14 or later for Classified Listing plugins, where the issue has been fixed. If updates are not immediately possible, implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns that attempt to inject scripts into URL parameters or form inputs. Additionally, site administrators should enforce Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. Regular security audits and penetration testing focusing on input validation and output encoding should be conducted. Educating users about the risks of clicking unknown links can also reduce the likelihood of successful exploitation. Finally, monitoring web server logs for unusual query parameters or repeated suspicious requests can help detect attempted exploitation attempts early.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-08-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6842df031a426642debc9722
Added to database: 6/6/2025, 12:28:51 PM
Last enriched: 7/7/2025, 6:55:35 PM
Last updated: 8/11/2025, 10:41:34 PM
Views: 13
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.