CVE-2022-2046

The Directorist WordPress plugin before 7.2.3 allows administrators to download other plugins from the same vendor directly to the site, but does not check the URL domain it gets the zip files from. This could allow administrators to run code on the server, which is a problem in multisite configurations.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpwax:directorist:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:00

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/changeset/2752034/directorist?contextall=1&old=2731298&old_path=%2Fdirectorist - Third Party Advisory () https://plugins.trac.wordpress.org/changeset/2752034/directorist?contextall=1&old=2731298&old_path=%2Fdirectorist - Third Party Advisory
References () https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807 - Exploit, Third Party Advisory

Information

Published : 2022-08-08 14:15

Updated : 2024-11-21 07:00


NVD link : CVE-2022-2046

Mitre link : CVE-2022-2046

CVE.ORG link : CVE-2022-2046


JSON object : View

Products Affected

wpwax

  • directorist
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type