CVE-2022-1560

The Amministrazione Aperta WordPress plugin before 3.8 does not validate the open parameter before using it in an include statement, leading to a Local File Inclusion issue. The original advisory mentions that unauthenticated users can exploit this, however the affected file generates a fatal error when accessed directly and the affected code is not reached. The issue can be exploited via the dashboard when logged in as an admin, or by making a logged in admin open a malicious link
Configurations

Configuration 1 (hide)

cpe:2.3:a:amministrazione_aperta_project:amministrazione_aperta:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 06:40

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/5c5fbbea-92d2-46bb-9a70-75155fffb6de - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/5c5fbbea-92d2-46bb-9a70-75155fffb6de - Exploit, Third Party Advisory

Information

Published : 2022-05-16 15:15

Updated : 2024-11-21 06:40


NVD link : CVE-2022-1560

Mitre link : CVE-2022-1560

CVE.ORG link : CVE-2022-1560


JSON object : View

Products Affected

amministrazione_aperta_project

  • amministrazione_aperta
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')