9.8

CVE-2022-40700

CSSTidy - Server-Side Request Forgery

Server-Side Request Forgery (SSRF) vulnerability in Montonio Montonio for WooCommerce, Wpopal Wpopal Core Features, AMO for WP – Membership Management ArcStone wp-amo, Long Watch Studio WooVirtualWallet – A virtual wallet for WooCommerce, Long Watch Studio WooVIP – Membership plugin for WordPress and WooCommerce, Long Watch Studio WooSupply – Suppliers, Supply Orders and Stock Management, Squidesma Theme Minifier, Paul Clark Styles styles, Designmodo Inc. WordPress Page Builder – Qards, Philip M. Hofer (Frumph) PHPFreeChat, Arun Basil Lal Custom Login Admin Front-end CSS, Team Agence-Press CSS Adder By Agence-Press, Unihost Confirm Data, deano1987 AMP Toolbox amp-toolbox, Arun Basil Lal Admin CSS MU.This issue affects Montonio for WooCommerce: from n/a through 6.0.1; Wpopal Core Features: from n/a through 1.5.8; ArcStone: from n/a through 4.6.6; WooVirtualWallet – A virtual wallet for WooCommerce: from n/a through 2.2.1; WooVIP – Membership plugin for WordPress and WooCommerce: from n/a through 1.4.4; WooSupply – Suppliers, Supply Orders and Stock Management: from n/a through 1.2.2; Theme Minifier: from n/a through 2.0; Styles: from n/a through 1.2.3; WordPress Page Builder – Qards: from n/a through 1.0.5; PHPFreeChat: from n/a through 0.2.8; Custom Login Admin Front-end CSS: from n/a through 1.4.1; CSS Adder By Agence-Press: from n/a through 1.5.0; Confirm Data: from n/a through 1.0.7; AMP Toolbox: from n/a through 2.1.1; Admin CSS MU: from n/a through 2.6.

Mögliche Gegenmaßnahme
Admin CSS MU: Update to version 2.7, or a newer patched version
AMP Toolbox: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Confirm Data: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
CSS Adder By Agence-Press: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Custom Login Admin Front-end CSS: Update to version 1.5, or a newer patched version
phpfreechat: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
WordPress Page Builder – Qards: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Styles: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Theme Minifier: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
WooSupply – Suppliers, Supply Orders and Stock Management: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
WooVIP – Membership plugin for WordPress and WooCommerce: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
WooVirtualWallet – A virtual wallet for WooCommerce: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
AMO for WP – Membership Management: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Wpopal Core Features: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Admin CSS MU
Version * - 2.6
SystemWordPress Plugin
Produkt AMP Toolbox
Version * - 2.1.1
SystemWordPress Plugin
Produkt Confirm Data
Version * - 1.0.7
SystemWordPress Plugin
Produkt CSS Adder By Agence-Press
Version * - 1.5.0
SystemWordPress Plugin
Produkt Custom Login Admin Front-end CSS
Version * - 1.4.1
SystemWordPress Plugin
Produkt phpfreechat
Version * - 2.0.8
SystemWordPress Plugin
Produkt WordPress Page Builder – Qards
Version * - 1.0.5
SystemWordPress Plugin
Produkt Styles
Version * - 1.2.3
SystemWordPress Plugin
Produkt Theme Minifier
Version * - 2.0
SystemWordPress Plugin
Produkt WooSupply – Suppliers, Supply Orders and Stock Management
Version * - 1.2.2.
SystemWordPress Plugin
Produkt WooVIP – Membership plugin for WordPress and WooCommerce
Version * - 1.4.4
SystemWordPress Plugin
Produkt WooVirtualWallet – A virtual wallet for WooCommerce
Version * - 2.2.1
SystemWordPress Plugin
Produkt AMO for WP – Membership Management
Version * - 4.6.6
SystemWordPress Plugin
Produkt Wpopal Core Features
Version * - 1.5.7
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MillioncluesAdmin Css Mu SwPlatformwordpress Version <= 2.6
DeanoAmp Toolbox SwPlatformwordpress Version <= 2.1.1
UnihostConfirm Data SwPlatformwordpress Version <= 1.0.7
Agence-pressCss Adder SwPlatformwordpress Version <= 1.5.0
MillioncluesCustom Login Admin Front-end Css SwPlatformwordpress Version <= 1.4.1
MontonioMontonio For Woocommerce SwPlatformwordpress Version <= 6.0.1
FrumphPhpfreechat SwPlatformwordpress Version <= 0.2.8
DesignmodoQards SwPlatformwordpress Version <= 1.0.5
PaulclarkStyles SwPlatformwordpress Version <= 1.2.3
SquidesmaTheme Minifier SwPlatformwordpress Version <= 2.0
LongwatchstudioWoosupply SwPlatformwordpress Version <= 1.2.2
LongwatchstudioWoovip SwPlatformwordpress Version <= 1.4.4
LongwatchstudioWoovirtualwallet SwPlatformwordpress Version <= 2.2.1
ArcstoneAmo For Wp - Membership Management SwPlatformwordpress Version <= 4.6.6
WpopalWpopal Core Features SwPlatformwordpress Version <= 1.5.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.73% 0.72
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
audit@patchstack.com 8.2 3.9 4.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CWE-918 Server-Side Request Forgery (SSRF)

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.