CVE-2022-2654: CWE-79 Cross-Site Scripting (XSS) in Unknown Classified Listing – Classified ads & Business Directory Plugin
The Classima WordPress theme before 2.1.11 and some of its required plugins (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20 and Classima Core before 1.10) do not escape a parameter before outputting it back in attributes, leading to Reflected Cross-Site Scripting
AI Analysis
Technical Summary
CVE-2022-2654 is a reflected Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Classified Listing – Classified ads & Business Directory Plugin and related components of the Classima WordPress theme prior to specified versions (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20, and Classima Core before 1.10). The vulnerability arises because these versions fail to properly escape user-supplied input parameters before reflecting them back into HTML attributes. This improper sanitization allows an attacker to inject malicious JavaScript code into the web page, which is then executed in the context of the victim's browser when they interact with the affected page. The vulnerability is exploitable remotely without authentication (AV:N/AC:L/PR:N), but requires user interaction (UI:R), such as clicking a crafted link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact includes limited confidentiality and integrity loss (C:L/I:L), but no impact on availability (A:N). The CVSS v3.1 base score is 6.1, indicating a medium severity level. No known exploits in the wild have been reported to date. The vulnerability is specific to WordPress sites using the affected Classima theme and plugins, which are typically used to create classified ads and business directory websites. Attackers could leverage this vulnerability to steal session cookies, perform actions on behalf of authenticated users, or redirect users to malicious sites, potentially leading to account compromise or phishing attacks.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and local businesses relying on WordPress-based classified ads or business directory websites, this vulnerability poses a tangible risk. Exploitation could lead to theft of user credentials or session tokens, enabling attackers to impersonate legitimate users or administrators. This can result in unauthorized access to sensitive business information or customer data, violating GDPR requirements and leading to regulatory penalties. Additionally, successful XSS attacks can damage brand reputation and erode customer trust. Since many European businesses use WordPress due to its ease of use and cost-effectiveness, the attack surface is significant. Furthermore, sectors such as real estate, local commerce, and service providers that use classified ads platforms are particularly vulnerable. The reflected nature of the XSS means attackers must entice users to click malicious links, which could be distributed via email or social media, increasing the risk of targeted phishing campaigns within European markets.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Classima theme and all related plugins to versions 2.1.11 or later for the theme, and 2.2.14 or later for Classified Listing plugins, where the issue has been fixed. If updates are not immediately possible, implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns that attempt to inject scripts into URL parameters or form inputs. Additionally, site administrators should enforce Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. Regular security audits and penetration testing focusing on input validation and output encoding should be conducted. Educating users about the risks of clicking unknown links can also reduce the likelihood of successful exploitation. Finally, monitoring web server logs for unusual query parameters or repeated suspicious requests can help detect attempted exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2022-2654: CWE-79 Cross-Site Scripting (XSS) in Unknown Classified Listing – Classified ads & Business Directory Plugin
Description
The Classima WordPress theme before 2.1.11 and some of its required plugins (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20 and Classima Core before 1.10) do not escape a parameter before outputting it back in attributes, leading to Reflected Cross-Site Scripting
AI-Powered Analysis
Technical Analysis
CVE-2022-2654 is a reflected Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the Classified Listing – Classified ads & Business Directory Plugin and related components of the Classima WordPress theme prior to specified versions (Classified Listing before 2.2.14, Classified Listing Pro before 2.0.20, Classified Listing Store & Membership before 1.4.20, and Classima Core before 1.10). The vulnerability arises because these versions fail to properly escape user-supplied input parameters before reflecting them back into HTML attributes. This improper sanitization allows an attacker to inject malicious JavaScript code into the web page, which is then executed in the context of the victim's browser when they interact with the affected page. The vulnerability is exploitable remotely without authentication (AV:N/AC:L/PR:N), but requires user interaction (UI:R), such as clicking a crafted link. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact includes limited confidentiality and integrity loss (C:L/I:L), but no impact on availability (A:N). The CVSS v3.1 base score is 6.1, indicating a medium severity level. No known exploits in the wild have been reported to date. The vulnerability is specific to WordPress sites using the affected Classima theme and plugins, which are typically used to create classified ads and business directory websites. Attackers could leverage this vulnerability to steal session cookies, perform actions on behalf of authenticated users, or redirect users to malicious sites, potentially leading to account compromise or phishing attacks.
Potential Impact
For European organizations, especially small and medium enterprises (SMEs) and local businesses relying on WordPress-based classified ads or business directory websites, this vulnerability poses a tangible risk. Exploitation could lead to theft of user credentials or session tokens, enabling attackers to impersonate legitimate users or administrators. This can result in unauthorized access to sensitive business information or customer data, violating GDPR requirements and leading to regulatory penalties. Additionally, successful XSS attacks can damage brand reputation and erode customer trust. Since many European businesses use WordPress due to its ease of use and cost-effectiveness, the attack surface is significant. Furthermore, sectors such as real estate, local commerce, and service providers that use classified ads platforms are particularly vulnerable. The reflected nature of the XSS means attackers must entice users to click malicious links, which could be distributed via email or social media, increasing the risk of targeted phishing campaigns within European markets.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Classima theme and all related plugins to versions 2.1.11 or later for the theme, and 2.2.14 or later for Classified Listing plugins, where the issue has been fixed. If updates are not immediately possible, implement Web Application Firewall (WAF) rules to detect and block suspicious input patterns that attempt to inject scripts into URL parameters or form inputs. Additionally, site administrators should enforce Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. Regular security audits and penetration testing focusing on input validation and output encoding should be conducted. Educating users about the risks of clicking unknown links can also reduce the likelihood of successful exploitation. Finally, monitoring web server logs for unusual query parameters or repeated suspicious requests can help detect attempted exploitation attempts early.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-08-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6842df031a426642debc9722
Added to database: 6/6/2025, 12:28:51 PM
Last enriched: 7/7/2025, 6:55:35 PM
Last updated: 2/7/2026, 10:25:34 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.