CVE-2022-0661

7.2 HIGH

📋 TL;DR

The Ad Injection WordPress plugin through version 1.2.0.19 contains a critical vulnerability that allows authenticated administrators to inject arbitrary HTML, JavaScript, and PHP code into website pages. This enables stored cross-site scripting (XSS) attacks and remote code execution (RCE), even when WordPress security constants like DISALLOW_FILE_EDIT are enabled. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Ad Injection WordPress Plugin
Versions: Through 1.2.0.19
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin-level access to exploit, but many WordPress sites have multiple administrators. DISALLOW_FILE_EDIT and DISALLOW_FILE_MOD constants do not mitigate this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full site compromise with attacker gaining complete control over the WordPress installation, data theft, malware distribution, and potential server-level access.

🟠

Likely Case

Site defacement, credential theft via XSS, backdoor installation, and data exfiltration.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place, but still significant risk due to admin-level exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is straightforward once authenticated. The vulnerability is well-documented in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.0.20 or later

Vendor Advisory: https://wpscan.com/vulnerability/3c5a7b03-d4c3-46b9-af65-fb50e58b0bfd

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Ad Injection' plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete the plugin immediately.

🔧 Temporary Workarounds

Remove vulnerable plugin

linux

Completely remove the Ad Injection plugin from your WordPress installation

rm -rf /path/to/wordpress/wp-content/plugins/ad-injection/

Restrict admin access

all

Temporarily restrict administrative access to only essential personnel

🧯 If You Can't Patch

  • Immediately deactivate and remove the Ad Injection plugin from all WordPress installations
  • Implement strict monitoring of admin user activities and file modifications

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Ad Injection version 1.2.0.19 or earlier

Check Version:

grep -r "Version:" /path/to/wordpress/wp-content/plugins/ad-injection/ | head -1

Verify Fix Applied:

Verify Ad Injection plugin version is 1.2.0.20 or later, or confirm plugin is completely removed

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin user activity modifying ad injection settings
  • Unexpected file modifications in wp-content/plugins/ad-injection/ directory
  • PHP execution attempts from ad injection functionality

Network Indicators:

  • Outbound connections from WordPress server to suspicious domains following admin panel access
  • Unusual POST requests to ad injection endpoints

SIEM Query:

source="wordpress.log" AND ("ad-injection" OR "ad_injection") AND (admin_user="*" AND action="*edit*" OR "*update*")

🔗 References

📤 Share & Export