Skip to main content

CVE-2022-3610: CWE-79 Cross-Site Scripting (XSS) in Unknown Jeeng Push Notifications

Medium
Published: Mon Nov 28 2022 (11/28/2022, 13:47:12 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Jeeng Push Notifications

Description

The Jeeng Push Notifications WordPress plugin before 2.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 06/24/2025, 13:15:08 UTC

Technical Analysis

CVE-2022-3610 is a Stored Cross-Site Scripting (XSS) vulnerability affecting the Jeeng Push Notifications WordPress plugin versions prior to 2.0.4. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with high privileges, such as administrators, to inject malicious scripts into the plugin's stored data. Notably, this vulnerability can be exploited even when the WordPress 'unfiltered_html' capability is disabled, which is often the case in multisite WordPress installations to restrict HTML content injection. The attack vector requires high privilege (admin-level) access and some user interaction, as the CVSS vector indicates user interaction is required. The vulnerability impacts confidentiality and integrity by enabling script injection that could lead to session hijacking, privilege escalation, or unauthorized actions performed in the context of the victim's browser session. The vulnerability does not affect availability. The CVSS score is 4.8 (medium severity), reflecting the need for high privileges and user interaction, but with low attack complexity and network attack vector. No known exploits in the wild have been reported, and no official patches or updates are linked, though upgrading to version 2.0.4 or later is implied to remediate the issue. The vulnerability is classified under CWE-79, indicating a classic stored XSS flaw. This vulnerability is specific to the Jeeng Push Notifications plugin, which is a niche WordPress plugin used to manage push notifications on websites. The threat is primarily relevant to WordPress sites using this plugin, especially multisite environments where unfiltered_html is disabled but admin users exist.

Potential Impact

For European organizations, the impact of CVE-2022-3610 depends largely on the adoption of the Jeeng Push Notifications plugin within their WordPress deployments. Organizations running WordPress multisite setups with this plugin are at risk of stored XSS attacks initiated by malicious or compromised administrators. Successful exploitation could lead to theft of session cookies, unauthorized actions performed with admin privileges, or the injection of malicious content affecting site visitors or internal users. This could result in data confidentiality breaches, integrity violations, and reputational damage. While the vulnerability does not directly impact availability, the indirect consequences of injected scripts could include phishing or malware distribution. Given the medium severity and requirement for admin privileges, the threat is more significant in environments with multiple administrators or where admin accounts are less strictly controlled. European organizations in sectors with high reliance on WordPress for public-facing or internal portals—such as media, education, and SMEs—may be particularly exposed if they use this plugin. The multisite context is common in larger organizations or managed service providers, increasing potential impact. Additionally, compliance with GDPR mandates protection of personal data, so any compromise resulting from this vulnerability could lead to regulatory scrutiny and fines if personal data is exposed or manipulated.

Mitigation Recommendations

1. Immediate upgrade of the Jeeng Push Notifications plugin to version 2.0.4 or later where the vulnerability is fixed. 2. Restrict administrative privileges strictly to trusted personnel and regularly audit admin accounts to minimize risk of insider threats or compromised credentials. 3. Implement Content Security Policy (CSP) headers to restrict execution of unauthorized scripts, mitigating impact of XSS payloads. 4. Employ Web Application Firewalls (WAFs) with rules tuned to detect and block XSS payloads in HTTP requests and stored content. 5. Regularly scan WordPress installations with specialized vulnerability scanners (e.g., WPScan) to detect outdated plugins and known vulnerabilities. 6. In multisite environments, review and harden user role assignments and capabilities, ensuring that only necessary users have admin rights. 7. Monitor logs and user activity for anomalous behavior indicative of exploitation attempts or successful attacks. 8. Educate administrators on secure plugin management and the risks of stored XSS, emphasizing the importance of input validation and cautious configuration. These steps go beyond generic advice by focusing on privilege management, multisite-specific considerations, and layered defenses such as CSP and WAF tailored to stored XSS threats.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-10-19T13:13:34.400Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbf0321

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 1:15:08 PM

Last updated: 8/12/2025, 1:28:33 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats