{"containers":{"cna":{"affected":[{"product":"Login/Signup Popup","vendor":"XootiX","versions":[{"lessThanOrEqual":"2.2","status":"affected","version":"2.2","versionType":"custom"}]},{"product":"Waitlist Woocommerce ( Back in stock notifier )","vendor":"XootiX","versions":[{"lessThanOrEqual":"2.5.1","status":"affected","version":"2.5.1","versionType":"custom"}]},{"product":"Side Cart Woocommerce (Ajax)","vendor":"XootiX","versions":[{"lessThanOrEqual":"2.0","status":"affected","version":"2.0","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Chloe Chamberland, Wordfence"}],"descriptions":[{"lang":"en","value":"The Login/Signup Popup, Waitlist Woocommerce ( Back in stock notifier ), and Side Cart Woocommerce (Ajax) WordPress plugins by XootiX are vulnerable to Cross-Site Request Forgery via the save_settings function found in the ~/includes/xoo-framework/admin/class-xoo-admin-settings.php file which makes it possible for attackers to update arbitrary options on a site that can be used to create an administrative user account and grant full privileged access to a compromised site. This affects versions <= 2.2 in Login/Signup Popup, versions <= 2.5.1 in Waitlist Woocommerce ( Back in stock notifier ), and versions <= 2.0 in Side Cart Woocommerce (Ajax)."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-01-18T16:52:32.000Z","orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.wordfence.com/blog/2022/01/84000-wordpress-sites-affected-by-three-plugins-with-the-same-vulnerability/"},{"tags":["x_refsource_MISC"],"url":"https://wordfence.com/vulnerability-advisories/#CVE-2022-0215"},{"tags":["x_refsource_MISC"],"url":"https://plugins.trac.wordpress.org/browser/easy-login-woocommerce/tags/2.2/includes/xoo-framework/admin/class-xoo-admin-settings.php#L122"},{"tags":["x_refsource_MISC"],"url":"https://plugins.trac.wordpress.org/browser/waitlist-woocommerce/tags/2.5.1/includes/xoo-framework/admin/class-xoo-admin-settings.php#L122"},{"tags":["x_refsource_MISC"],"url":"https://plugins.trac.wordpress.org/browser/side-cart-woocommerce/tags/2.1/includes/xoo-framework/admin/class-xoo-admin-settings.php?rev=2538194#L128"}],"solutions":[{"lang":"en","value":"Update to the latest versions available for each plugin."}],"source":{"discovery":"UNKNOWN"},"title":"XootiX Plugins <= Various Versions Cross-Site Request Forgery to Arbitrary Options Update","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"AKA":"Wordfence","ASSIGNER":"security@wordfence.com","ID":"CVE-2022-0215","STATE":"PUBLIC","TITLE":"XootiX Plugins <= Various Versions Cross-Site Request Forgery to Arbitrary Options Update"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Login/Signup Popup","version":{"version_data":[{"version_affected":"<=","version_name":"2.2","version_value":"2.2"}]}},{"product_name":"Waitlist Woocommerce ( Back in stock notifier )","version":{"version_data":[{"version_affected":"<=","version_name":"2.5.1","version_value":"2.5.1"}]}},{"product_name":"Side Cart Woocommerce (Ajax)","version":{"version_data":[{"version_affected":"<=","version_name":"2.0","version_value":"2.0"}]}}]},"vendor_name":"XootiX"}]}},"credit":[{"lang":"eng","value":"Chloe Chamberland, Wordfence"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Login/Signup Popup, Waitlist Woocommerce ( Back in stock notifier ), and Side Cart Woocommerce (Ajax) WordPress plugins by XootiX are vulnerable to Cross-Site Request Forgery via the save_settings function found in the ~/includes/xoo-framework/admin/class-xoo-admin-settings.php file which makes it possible for attackers to update arbitrary options on a site that can be used to create an administrative user account and grant full privileged access to a compromised site. This affects versions <= 2.2 in Login/Signup Popup, versions <= 2.5.1 in Waitlist Woocommerce ( Back in stock notifier ), and versions <= 2.0 in Side Cart Woocommerce (Ajax)."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)"}]}]},"references":{"reference_data":[{"name":"https://www.wordfence.com/blog/2022/01/84000-wordpress-sites-affected-by-three-plugins-with-the-same-vulnerability/","refsource":"MISC","url":"https://www.wordfence.com/blog/2022/01/84000-wordpress-sites-affected-by-three-plugins-with-the-same-vulnerability/"},{"name":"https://wordfence.com/vulnerability-advisories/#CVE-2022-0215","refsource":"MISC","url":"https://wordfence.com/vulnerability-advisories/#CVE-2022-0215"},{"name":"https://plugins.trac.wordpress.org/browser/easy-login-woocommerce/tags/2.2/includes/xoo-framework/admin/class-xoo-admin-settings.php#L122","refsource":"MISC","url":"https://plugins.trac.wordpress.org/browser/easy-login-woocommerce/tags/2.2/includes/xoo-framework/admin/class-xoo-admin-settings.php#L122"},{"name":"https://plugins.trac.wordpress.org/browser/waitlist-woocommerce/tags/2.5.1/includes/xoo-framework/admin/class-xoo-admin-settings.php#L122","refsource":"MISC","url":"https://plugins.trac.wordpress.org/browser/waitlist-woocommerce/tags/2.5.1/includes/xoo-framework/admin/class-xoo-admin-settings.php#L122"},{"name":"https://plugins.trac.wordpress.org/browser/side-cart-woocommerce/tags/2.1/includes/xoo-framework/admin/class-xoo-admin-settings.php?rev=2538194#L128","refsource":"MISC","url":"https://plugins.trac.wordpress.org/browser/side-cart-woocommerce/tags/2.1/includes/xoo-framework/admin/class-xoo-admin-settings.php?rev=2538194#L128"}]},"solution":[{"lang":"en","value":"Update to the latest versions available for each plugin."}],"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:18:42.789Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.wordfence.com/blog/2022/01/84000-wordpress-sites-affected-by-three-plugins-with-the-same-vulnerability/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wordfence.com/vulnerability-advisories/#CVE-2022-0215"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://plugins.trac.wordpress.org/browser/easy-login-woocommerce/tags/2.2/includes/xoo-framework/admin/class-xoo-admin-settings.php#L122"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://plugins.trac.wordpress.org/browser/waitlist-woocommerce/tags/2.5.1/includes/xoo-framework/admin/class-xoo-admin-settings.php#L122"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://plugins.trac.wordpress.org/browser/side-cart-woocommerce/tags/2.1/includes/xoo-framework/admin/class-xoo-admin-settings.php?rev=2538194#L128"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-13T20:41:27.213869Z","id":"CVE-2022-0215","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-13T20:41:32.669Z"}}]},"cveMetadata":{"assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","assignerShortName":"Wordfence","cveId":"CVE-2022-0215","datePublished":"2022-01-18T16:52:32.000Z","dateReserved":"2022-01-13T00:00:00.000Z","dateUpdated":"2025-02-13T20:41:32.669Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}