
Cloud Vulnerability DB
A community-led vulnerabilities database
The Craw Data WordPress plugin through version 1.0.0 contains a Server-Side Request Forgery (SSRF) vulnerability due to missing nonce checks. The vulnerability was discovered and publicly disclosed on August 19, 2022, and was assigned CVE-2022-2912. This security flaw affects the plugin's URL handling functionality and has been assigned a CVSS score of 5.4 (medium severity) (WPScan).
The vulnerability stems from the plugin's failure to implement nonce checks in its functionality. When configuring the CrawData addon, attackers can manipulate the URL parameter in requests to the admin-ajax.php endpoint. The vulnerability is triggered through a GET request to '/wordpress/wp-admin/admin-ajax.php' with a modified 'url' parameter, allowing for unwanted crawls on third-party sites. The issue is classified under CWE-918 and falls into the OWASP Top 10 category A1: Injection (WPScan).
The vulnerability allows attackers with administrative access to perform unwanted crawls on third-party sites through Server-Side Request Forgery. This could potentially be used to probe internal networks or conduct unauthorized scans of external systems (WPScan).
As of the vulnerability disclosure, there is no known fix available for this security issue. Users of the Craw Data plugin should consider implementing additional security controls or temporarily disabling the plugin until a patch is available (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."