Skip to main content

CVE-2022-3441: CWE-79 Cross-Site Scripting (XSS) in Unknown Rock Convert

Medium
VulnerabilityCVE-2022-3441cvecve-2022-3441cwe-79
Published: Mon Oct 31 2022 (10/31/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Rock Convert

Description

The Rock Convert WordPress plugin before 2.11.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/05/2025, 16:25:04 UTC

Technical Analysis

CVE-2022-3441 is a medium-severity vulnerability classified as CWE-79 (Cross-Site Scripting, XSS) found in the Rock Convert WordPress plugin versions prior to 2.11.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject and store malicious scripts within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which normally restricts the ability to post unfiltered HTML. The attack vector requires the attacker to have high privileges (admin level) and some user interaction, as the malicious payload is stored and executed when the affected settings are viewed or processed. The CVSS 3.1 base score is 4.8 (medium), reflecting that the attack requires high privileges and user interaction, but can lead to confidentiality and integrity impacts due to script execution in the context of an administrator or other users viewing the stored payload. The vulnerability does not affect availability. There are no known active exploits in the wild, and no official patches are linked in the provided data, but upgrading to version 2.11.0 or later is implied to remediate the issue. The vulnerability was publicly disclosed on October 31, 2022, and was assigned by WPScan. The scope is considered changed (S:C) because the vulnerability affects components beyond the immediate privileges of the attacker, potentially impacting other users.

Potential Impact

For European organizations using WordPress sites with the Rock Convert plugin, this vulnerability poses a risk primarily to site integrity and confidentiality. An attacker with admin privileges could inject malicious scripts that execute in the browsers of other users or administrators, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users. In multisite WordPress setups common in larger organizations or managed service providers, the impact could be amplified because the unfiltered_html capability is often restricted to reduce risk, yet this vulnerability bypasses that protection. This could lead to lateral movement or privilege escalation within the WordPress environment. While the vulnerability does not directly affect availability, the compromise of administrative accounts or data leakage could have significant operational and reputational consequences. Given the widespread use of WordPress in Europe for business, government, and non-profit websites, exploitation could affect data privacy compliance under GDPR if personal data is exposed or manipulated. However, exploitation requires existing high privileges, so the threat is more relevant in scenarios where insider threats or compromised admin accounts exist.

Mitigation Recommendations

European organizations should take the following specific measures: 1) Immediately verify if the Rock Convert plugin is installed on any WordPress instances and identify the version in use. 2) Upgrade the plugin to version 2.11.0 or later, where the vulnerability is fixed. 3) Review and restrict administrative privileges to only trusted personnel, minimizing the number of users with high-level access. 4) Implement strict monitoring and logging of administrative actions within WordPress to detect unusual behavior that could indicate exploitation attempts. 5) In multisite environments, enforce additional input validation and consider using Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting plugin settings. 6) Conduct regular security audits and vulnerability scans focusing on plugins and themes, as third-party components are common attack vectors. 7) Educate administrators on the risks of stored XSS and the importance of cautious input handling. 8) If possible, sandbox or isolate critical WordPress instances to limit the impact of potential compromises. These steps go beyond generic advice by focusing on privilege management, monitoring, and environment-specific controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-10-10T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9e6a

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 4:25:04 PM

Last updated: 7/30/2025, 1:58:32 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats