CVE-2022-1119

The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7.
Configurations

Configuration 1 (hide)

cpe:2.3:a:simplefilelist:simple-file-list:*:*:*:*:*:wordpress:*:*

History

11 Jan 2024, 09:15

Type Values Removed Values Added
Summary The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7. The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7.
References
  • {'url': 'https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1119', 'name': 'https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1119', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • () https://www.wordfence.com/threat-intel/vulnerabilities/id/ff21241d-e488-4460-b8c2-d5a070c8c107?source=cve -

Information

Published : 2022-04-19 21:15

Updated : 2024-02-28 19:09


NVD link : CVE-2022-1119

Mitre link : CVE-2022-1119

CVE.ORG link : CVE-2022-1119


JSON object : View

Products Affected

simplefilelist

  • simple-file-list
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')