Security for everyone

CVE-2022-3933 Scanner

Detects 'Cross-Site Scripting' vulnerability in WordPress Essential Real Estate plugin affects v. <3.9.6


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4



The WordPress Essential Real Estate plugin, developed by g5theme, is designed for real estate management on WordPress websites. It enables users to list properties, manage listings, and provide a comprehensive search functionality for real estate inquiries. This plugin is widely used by real estate agencies and individual realtors to showcase properties online, offering various features such as property galleries, maps, and property details. Before version 3.9.6, it contained a vulnerability that compromised the security of websites using it. It is crucial for maintaining the integrity of real estate listings and ensuring the safety of user data.

This vulnerability is an instance of Cross-Site Scripting (XSS) that exists in versions of the WordPress Essential Real Estate plugin before 3.9.6. XSS vulnerabilities allow attackers to inject malicious scripts into web pages viewed by other users. Such scripts can steal cookie-based authentication credentials or perform actions on behalf of the victims without their consent. In this case, the vulnerability can be exploited by authenticated users with administrative privileges, posing a significant risk to website security.

The vulnerability arises due to the plugin's failure to properly sanitize and escape input parameters, specifically within the property gallery functionality. An attacker with administrative access can inject arbitrary JavaScript code through the application's interface, which is then executed in the browser of any user viewing the affected page. This could lead to unauthorized actions being taken on the behalf of the user, data theft, or the compromise of the entire website. The specific endpoint affected is the wp-admin/admin-ajax.php when accessed with the action=ere_property_gallery_fillter_ajax parameter.

The exploitation of this XSS vulnerability can lead to several adverse effects, including theft of authentication cookies, session hijacking, redirection of users to malicious sites, and the potential for further exploitation of the site's users or the site itself. Such attacks can undermine the trust in a website, damage its reputation, and potentially lead to financial losses or legal liabilities for the site owners.

By utilizing the security scanning capabilities on the securityforeveryone platform, users can identify and mitigate vulnerabilities like CVE-2022-3933 in their digital assets. This proactive approach ensures the security of your website, protects sensitive data, and maintains user trust. Members benefit from comprehensive vulnerability detection, detailed reports, and actionable insights, enabling them to stay ahead of potential threats. Join securityforeveryone today to secure your online presence and leverage the expertise of cybersecurity professionals.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture