CVE-2022-41990

7.1 HIGH

📋 TL;DR

This vulnerability in the Vinoj Cardoza 3D Tag Cloud WordPress plugin allows attackers to perform Cross-Site Request Forgery (CSRF) attacks that lead to Stored Cross-Site Scripting (XSS). Attackers can trick authenticated administrators into executing malicious actions that inject persistent scripts into the website. This affects all WordPress sites using the 3D Tag Cloud plugin versions up to and including 3.8.

💻 Affected Systems

Products:
  • Vinoj Cardoza 3D Tag Cloud WordPress Plugin
Versions: All versions up to and including 3.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and activated on a WordPress site. The vulnerability is exploitable when an authenticated administrator visits a malicious page while logged in.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could compromise administrator accounts, inject malicious JavaScript that steals session cookies or credentials, deface websites, redirect visitors to malicious sites, or install backdoors for persistent access.

🟠

Likely Case

Attackers would typically inject malicious scripts to steal administrator session cookies, potentially gaining full control over the WordPress site to modify content, install additional plugins, or create backdoor accounts.

🟢

If Mitigated

With proper CSRF protections and input validation, the attack would fail at the initial CSRF stage, preventing any XSS payload from being stored or executed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick an authenticated administrator into clicking a malicious link. The CSRF-to-XSS chain is well-documented and weaponization is straightforward given the prevalence of WordPress.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.9 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/cardoza-3d-tag-cloud/wordpress-3d-tag-cloud-plugin-3-8-stored-cross-site-scripting-xss-via-cross-site-request-forgery-csrf-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find '3D Tag Cloud' and check if update is available. 4. Click 'Update Now' to upgrade to version 3.9 or later. 5. Verify the plugin version after update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Deactivate the vulnerable plugin until a patch can be applied

wp plugin deactivate cardoza-3d-tag-cloud

CSRF Protection Implementation

all

Add custom CSRF tokens to plugin forms via WordPress hooks

Add wp_nonce_field() to plugin forms and verify with wp_verify_nonce()

🧯 If You Can't Patch

  • Remove or disable the 3D Tag Cloud plugin completely
  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins, find '3D Tag Cloud' and verify version is 3.8 or earlier

Check Version:

wp plugin get cardoza-3d-tag-cloud --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 3.9 or later in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with plugin-specific actions
  • Administrator account performing unexpected plugin configuration changes

Network Indicators:

  • HTTP requests containing malicious script tags in plugin parameter values
  • CSRF exploitation patterns with referrer mismatches

SIEM Query:

source="wordpress.log" AND ("3d-tag-cloud" OR "cardoza") AND (POST OR admin-ajax)

🔗 References

📤 Share & Export