CVE-2022-45360

9.8 CRITICAL

📋 TL;DR

This vulnerability allows CSV injection attacks in the WordPress Commenter Emails plugin. Attackers can embed malicious formulas in CSV files that execute when opened in spreadsheet applications like Excel, potentially leading to command execution or data theft. WordPress sites using vulnerable versions of the Commenter Emails plugin are affected.

💻 Affected Systems

Products:
  • WordPress Commenter Emails plugin
Versions: n/a through 2.6.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with vulnerable plugin version and CSV export functionality usage.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on systems opening malicious CSV files, data exfiltration, or complete system compromise through formula execution in spreadsheet applications.

🟠

Likely Case

Data theft or manipulation through formula execution when users open exported CSV files in vulnerable spreadsheet applications.

🟢

If Mitigated

Limited impact if CSV files are processed programmatically without spreadsheet applications or with proper input validation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction to open malicious CSV file in vulnerable spreadsheet application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/commenter-emails/wordpress-commenter-emails-plugin-2-6-1-csv-injection

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Commenter Emails plugin. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable CSV export functionality

all

Temporarily disable CSV export features in plugin settings to prevent exploitation.

Input validation filter

all

Add custom filter to sanitize CSV output by escaping formula characters (=, +, -, @).

Add to theme's functions.php: add_filter('commenter_emails_csv_output', 'sanitize_csv_formulas'); function sanitize_csv_formulas($data) { return preg_replace('/^[=+\-@]/', "'$0", $data); }

🧯 If You Can't Patch

  • Disable or uninstall the Commenter Emails plugin entirely
  • Restrict CSV file downloads to trusted users only and educate users about CSV injection risks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for Commenter Emails version 2.6.1 or earlier.

Check Version:

wp plugin list --name=commenter-emails --field=version

Verify Fix Applied:

Verify plugin version is 2.6.2 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • CSV export requests with suspicious payloads in query parameters
  • Plugin update failures

Network Indicators:

  • HTTP requests to plugin CSV export endpoints with formula characters in parameters

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path LIKE "%/commenter-emails%") AND (query CONTAINS "csv" OR query CONTAINS "export") AND (query CONTAINS "=" OR query CONTAINS "+" OR query CONTAINS "-" OR query CONTAINS "@")

🔗 References

📤 Share & Export