CVE-2022-45810
📋 TL;DR
This CVE describes a CSV injection vulnerability in the Icegram Express WordPress plugin. Attackers can embed malicious formulas in CSV files that, when opened in spreadsheet applications like Excel, execute arbitrary commands. This affects WordPress sites using Icegram Express versions up to 5.5.2.
💻 Affected Systems
- Icegram Express – Email Marketing, Newsletters and Automation for WordPress & WooCommerce
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution on client machines when users open malicious CSV exports in vulnerable spreadsheet applications, potentially leading to full system compromise.
Likely Case
Data theft, malware installation, or command execution on client systems when users open exported CSV files in spreadsheet software.
If Mitigated
Limited impact if users open CSV files in text editors or properly configured spreadsheet applications with formula execution disabled.
🎯 Exploit Status
Exploitation requires user to download and open CSV file. Attack typically targets client-side spreadsheet applications rather than the server.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.5.3 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Icegram Express plugin. 4. Click 'Update Now' if update available. 5. If no update available, download version 5.5.3+ from WordPress repository and manually update.
🔧 Temporary Workarounds
Disable CSV Export
allTemporarily disable CSV export functionality in plugin settings
Educate Users
allTrain users to open CSV files in text editors or with formula execution disabled in spreadsheet applications
🧯 If You Can't Patch
- Disable the Icegram Express plugin entirely until patched
- Implement web application firewall rules to block CSV export requests
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Icegram Express → Version. If version is 5.5.2 or earlier, you are vulnerable.
Check Version:
wp plugin get icegram-express --field=version
Verify Fix Applied:
Verify plugin version is 5.5.3 or later in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual CSV export requests
- Multiple failed CSV export attempts
Network Indicators:
- CSV file downloads containing formula characters (=, +, -, @) at beginning of cells
SIEM Query:
source="wordpress.log" AND "csv" AND "export" AND ("icegram" OR "email-subscribers")
🔗 References
- https://patchstack.com/database/vulnerability/email-subscribers/wordpress-icegram-express-email-subscribers-newsletters-and-marketing-automation-plugin-plugin-5-5-2-csv-injection?_s_id=cve
- https://patchstack.com/database/vulnerability/email-subscribers/wordpress-icegram-express-email-subscribers-newsletters-and-marketing-automation-plugin-plugin-5-5-2-csv-injection?_s_id=cve