CVE-2022-0687

The Amelia WordPress plugin before 1.0.47 stores image blobs into actual files whose extension is controlled by the user, which may lead to PHP backdoors being uploaded onto the site. This vulnerability can be exploited by logged-in users with the custom "Amelia Manager" role.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tms-outsource:amelia:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 06:39

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c - Exploit, Third Party Advisory

Information

Published : 2022-03-21 19:15

Updated : 2024-11-21 06:39


NVD link : CVE-2022-0687

Mitre link : CVE-2022-0687

CVE.ORG link : CVE-2022-0687


JSON object : View

Products Affected

tms-outsource

  • amelia
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type