Skip to main content

CVE-2022-3135: CWE-79 Cross-Site Scripting (XSS) in Unknown SEO Smart Links

Medium
VulnerabilityCVE-2022-3135cvecve-2022-3135cwe-79
Published: Mon Sep 26 2022 (09/26/2022, 12:35:45 UTC)
Source: CVE
Vendor/Project: Unknown
Product: SEO Smart Links

Description

The SEO Smart Links WordPress plugin through 3.0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/07/2025, 13:10:48 UTC

Technical Analysis

CVE-2022-3135 is a medium-severity vulnerability identified in the SEO Smart Links WordPress plugin, specifically affecting versions up to and including 3.0.1. The vulnerability is classified as a Stored Cross-Site Scripting (XSS) issue (CWE-79), where the plugin fails to properly sanitize and escape certain settings. This flaw allows users with high privileges, such as administrators, to inject malicious scripts that are persistently stored and executed in the context of the WordPress site. Notably, this vulnerability can be exploited even when the unfiltered_html capability is disabled, such as in multisite WordPress setups, which typically restrict the ability to add raw HTML. The attack vector requires the attacker to have high privileges (PR:H) and some user interaction (UI:R), but the vulnerability can lead to a scope change (S:C), meaning the impact can extend beyond the initially compromised component. The CVSS 3.1 base score is 4.8, indicating a medium severity level, with the impact primarily on confidentiality and integrity, but no direct impact on availability. The vulnerability is network exploitable (AV:N) with low attack complexity (AC:L). There are no known exploits in the wild as of the published date, and no official patches have been linked in the provided information. The vulnerability is significant because stored XSS attacks can lead to session hijacking, privilege escalation, or distribution of malware to site visitors, especially when executed by high-privilege users who can modify site content and settings.

Potential Impact

For European organizations using WordPress sites with the SEO Smart Links plugin version 3.0.1 or earlier, this vulnerability poses a risk of persistent XSS attacks that can compromise site integrity and confidentiality. Attackers with administrative access could inject malicious scripts that affect other administrators or users, potentially leading to credential theft, unauthorized actions, or further compromise of the website and connected systems. This is particularly concerning for organizations managing multisite WordPress installations, common in educational institutions, government portals, and large enterprises across Europe, where the unfiltered_html capability is often restricted but this vulnerability bypasses that protection. The exploitation could undermine trust in the affected websites, lead to data breaches, and cause reputational damage. While the vulnerability does not directly affect availability, the indirect consequences of injected scripts could disrupt normal operations or lead to defacement. Given the widespread use of WordPress in Europe, especially among small and medium enterprises and public sector entities, the impact could be significant if not addressed promptly.

Mitigation Recommendations

European organizations should immediately verify if their WordPress installations use the SEO Smart Links plugin version 3.0.1 or earlier. Since no official patch link is provided, organizations should consider the following specific mitigations: 1) Temporarily disable or remove the SEO Smart Links plugin until a secure version is available. 2) Restrict administrative access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 3) Review and sanitize all plugin settings manually to remove any suspicious or injected content. 4) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on the website. 5) Monitor logs and user activities for unusual behavior indicative of exploitation attempts. 6) Engage with the plugin vendor or community to obtain or contribute to a patched version. 7) For multisite setups, audit user capabilities and consider additional hardening measures to prevent privilege escalation. 8) Educate administrators about the risks of stored XSS and safe content management practices. These targeted actions go beyond generic advice by focusing on the specific plugin and the nature of the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-09-05T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682e280cc4522896dcc6c683

Added to database: 5/21/2025, 7:22:52 PM

Last enriched: 7/7/2025, 1:10:48 PM

Last updated: 8/1/2025, 6:58:44 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats