Skip to main content

CVE-2022-3753: CWE-79 Cross-Site Scripting (XSS) in Unknown Evaluate

Medium
VulnerabilityCVE-2022-3753cvecve-2022-3753cwe-79
Published: Mon Nov 21 2022 (11/21/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Evaluate

Description

The Evaluate WordPress plugin through 1.0 does not sanitize and escapes some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).

AI-Powered Analysis

AILast updated: 06/25/2025, 08:30:25 UTC

Technical Analysis

CVE-2022-3753 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Evaluate WordPress plugin, specifically in versions up to 1.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows high-privilege users, such as administrators, to inject malicious scripts that are stored persistently within the plugin's settings. Notably, this vulnerability can be exploited even when the WordPress capability 'unfiltered_html' is disabled, such as in multisite configurations, which typically restricts the ability to post unfiltered HTML content. The attack vector requires that the attacker already has high-level privileges (admin or equivalent) and involves user interaction, as the malicious script executes when a victim views the affected settings or pages where the payload is rendered. The CVSS 3.1 base score is 4.8 (medium severity), reflecting that the vulnerability has a network attack vector with low attack complexity, requires high privileges, and user interaction, and impacts confidentiality and integrity with no effect on availability. The scope is changed, indicating that the vulnerability affects components beyond the initially vulnerable component. Although no known exploits are reported in the wild, the vulnerability poses a risk of privilege escalation or session hijacking within the WordPress environment due to the stored XSS nature. Since the plugin is a WordPress extension, the vulnerability is relevant to websites using this plugin, which may be used for various content evaluation or review purposes. The lack of available patches or updates at the time of publication increases the urgency for mitigation through configuration or access control measures.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the adoption of the Evaluate WordPress plugin within their web infrastructure. Organizations running WordPress sites with this plugin installed and used by administrators are at risk of stored XSS attacks that could lead to session hijacking, unauthorized actions performed with admin privileges, or theft of sensitive information accessible via the admin interface. This could compromise the confidentiality and integrity of the website content and administrative data. In sectors such as e-commerce, government, education, and media, where WordPress is widely used, exploitation could lead to reputational damage, data breaches, and potential regulatory non-compliance under GDPR if personal data is exposed. The fact that the vulnerability can be exploited even when unfiltered_html is disabled in multisite setups means that large organizations or hosting providers using multisite WordPress installations are also vulnerable. Although the vulnerability requires high privileges, insider threats or compromised admin accounts could leverage this flaw to escalate attacks. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as stored XSS vulnerabilities are often leveraged in chained attacks. Therefore, European organizations should consider this vulnerability a moderate risk that could facilitate further compromise if combined with other weaknesses.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting administrative access to trusted personnel only and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 2. Review and audit all installed WordPress plugins, specifically checking for the presence of the Evaluate plugin and its version. If found, consider disabling or uninstalling the plugin until a secure patched version is released. 3. Implement strict input validation and output encoding at the application level where possible, especially for plugin settings or custom fields, to prevent injection of malicious scripts. 4. Use Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS vulnerabilities. 5. Monitor administrative activity logs for unusual behavior that might indicate exploitation attempts. 6. For multisite WordPress installations, verify that site administrators have appropriate privileges and consider limiting plugin installation and configuration rights to super-admins only. 7. Stay updated with vendor advisories and apply patches promptly once available. 8. Conduct regular security assessments and penetration testing focusing on WordPress plugins and administrative interfaces to detect similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-10-29T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbeddf4

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 6/25/2025, 8:30:25 AM

Last updated: 8/13/2025, 7:56:51 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats