The Welcart e-Commerce WordPress plugin before 2.8.5 does not validate user input before using it to output the content of a file via an AJAX action available to any authenticated users, which could allow users with a role as low as subscriber to read arbitrary files on the server.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/436d8894-dab8-41ea-8ed0-a3338aded635 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/436d8894-dab8-41ea-8ed0-a3338aded635 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/436d8894-dab8-41ea-8ed0-a3338aded635 - Exploit, Third Party Advisory | |
Summary |
|
Information
Published : 2023-01-02 22:15
Updated : 2024-11-21 07:34
NVD link : CVE-2022-4236
Mitre link : CVE-2022-4236
CVE.ORG link : CVE-2022-4236
JSON object : View
Products Affected
collne
- welcart_e-commerce
CWE
CWE-552
Files or Directories Accessible to External Parties