RULE(RULE ID:336197)

Rule General Information
Release Date: 2022-01-26
Rule Name: WordPress admin-ajax.php XSS Vulnerability (CVE-2022-21662)
Severity:
CVE ID:
Rule Protection Details
Description: WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Low-privileged authenticated users (like author) in WordPress core are able to execute JavaScript/perform stored XSS attack, which can affect high-privileged users. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue.
Impact: An attacker can conduct a cross-site scripting attack to inject malicious client-side scripts into web pages viewed by other users, or to bypass access controls such as the same-origin policy, if affected version is installed.
Affected OS: Windows, Linux, Others
Reference: https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-699q-3hj9-889w
https://lists.debian.org/debian-lts-announce/2022/01/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CV4UNEC63UU5GEU47IIR4RMTZAHNEOJG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DM6XPH3JN6V4NF4WBOJTOXZIVE6VKKE3/
Solutions
The vendor has released upgrade patches to fix vulnerabilities, please visit:
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-699q-3hj9-889w