Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-3631: CWE-79 Cross-Site Scripting (XSS) in Unknown OAuth Client by DigitialPixies

0
Medium
VulnerabilityCVE-2022-3631cvecve-2022-3631cwe-79
Published: Mon Nov 14 2022 (11/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: OAuth Client by DigitialPixies

Description

The OAuth Client by DigitialPixies WordPress plugin through 1.1.0 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).

AI-Powered Analysis

AILast updated: 06/25/2025, 08:02:08 UTC

Technical Analysis

CVE-2022-3631 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the OAuth Client plugin by DigitialPixies for WordPress, specifically affecting version 1.1.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows high-privilege users, such as administrators, to inject malicious scripts that are stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress unfiltered_html capability is disabled, such as in multisite environments, which typically restricts the ability to insert raw HTML or scripts. The attack vector requires the attacker to have high privileges (admin level) and user interaction (e.g., visiting a maliciously crafted page or triggering the stored payload). The vulnerability impacts confidentiality and integrity by enabling script execution in the context of the WordPress admin interface, potentially leading to session hijacking, privilege escalation, or further compromise of the site. The CVSS 3.1 base score is 4.8 (medium severity), reflecting network exploitability with low attack complexity but requiring high privileges and user interaction. No known exploits are currently reported in the wild, and no official patches have been linked, indicating that mitigation may rely on plugin updates or configuration changes.

Potential Impact

For European organizations using WordPress sites with the OAuth Client by DigitialPixies plugin version 1.1.0, this vulnerability poses a moderate risk. Since exploitation requires administrative privileges, the primary threat is from insider threats or compromised admin accounts. Successful exploitation could allow attackers to execute arbitrary JavaScript in the admin context, potentially leading to theft of sensitive information, manipulation of site content, or further compromise of the WordPress environment. This can affect the confidentiality and integrity of organizational data and disrupt business operations. Organizations operating multisite WordPress installations are particularly at risk since the vulnerability bypasses the unfiltered_html capability restriction, which is often used to limit script injection. Given the widespread use of WordPress in Europe across sectors such as government, education, and commerce, the vulnerability could be leveraged to target critical websites, erode user trust, or facilitate broader attacks. However, the lack of known active exploitation and the requirement for high privileges reduce the immediate threat level.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting administrative access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 2. Monitor and audit administrative actions and plugin settings changes to detect suspicious activity indicative of attempted exploitation. 3. Since no official patch is currently linked, organizations should consider temporarily disabling or removing the OAuth Client by DigitialPixies plugin if it is not essential. 4. For multisite WordPress environments, review and tighten capability assignments to limit the number of users with high privileges. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block typical XSS payloads targeting plugin settings interfaces. 6. Stay updated with vendor announcements for patches or updates addressing this vulnerability and apply them promptly once available. 7. Conduct regular security assessments and penetration testing focusing on plugin vulnerabilities and privilege escalation paths within WordPress.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-10-21T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbede83

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 6/25/2025, 8:02:08 AM

Last updated: 2/7/2026, 11:09:35 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats