The Enable Media Replace WordPress plugin before 4.0.0 does not ensure that renamed files are moved to the Upload folder, which could allow high privilege users such as admin to move them outside to the web root directory via a path traversal attack for example
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9 - Exploit, Third Party Advisory |
Information
Published : 2022-10-10 21:15
Updated : 2024-11-21 07:01
NVD link : CVE-2022-2554
Mitre link : CVE-2022-2554
CVE.ORG link : CVE-2022-2554
JSON object : View
Products Affected
shortpixel
- enable_media_replace
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')