CVE-2022-4949

The AdSanity plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'ajax_upload' function in versions up to, and including, 1.8.1. This makes it possible for authenticated attackers with Contributor+ level privileges to upload arbitrary files on the affected sites server which makes remote code execution possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:adsanityplugin:adsanity:*:*:*:*:*:wordpress:*:*

Configuration 2 (hide)

cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:36

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2023/11/09/3 - Mailing List () http://www.openwall.com/lists/oss-security/2023/11/09/3 - Mailing List
References () http://xenbits.xen.org/xsa/advisory-443.html - Patch, Third Party Advisory () http://xenbits.xen.org/xsa/advisory-443.html - Patch, Third Party Advisory
References () https://blog.nintechnet.com/critical-vulnerability-in-wordpress-adsanity-plugin/ - Exploit () https://blog.nintechnet.com/critical-vulnerability-in-wordpress-adsanity-plugin/ - Exploit
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/effd72d2-876d-4f8d-b1e4-5ab38eab401b?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/effd72d2-876d-4f8d-b1e4-5ab38eab401b?source=cve - Third Party Advisory

12 Jan 2024, 22:07

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2023/11/09/3 - () http://www.openwall.com/lists/oss-security/2023/11/09/3 - Mailing List
References () http://xenbits.xen.org/xsa/advisory-443.html - () http://xenbits.xen.org/xsa/advisory-443.html - Patch, Third Party Advisory
CPE cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
First Time Xen
Xen xen

10 Nov 2023, 07:15

Type Values Removed Values Added
References
  • () http://xenbits.xen.org/xsa/advisory-443.html -

09 Nov 2023, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2023/11/09/3 -

13 Jun 2023, 18:40

Type Values Removed Values Added
References (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/effd72d2-876d-4f8d-b1e4-5ab38eab401b?source=cve - (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/effd72d2-876d-4f8d-b1e4-5ab38eab401b?source=cve - Third Party Advisory
References (MISC) https://blog.nintechnet.com/critical-vulnerability-in-wordpress-adsanity-plugin/ - (MISC) https://blog.nintechnet.com/critical-vulnerability-in-wordpress-adsanity-plugin/ - Exploit
CPE cpe:2.3:a:adsanityplugin:adsanity:*:*:*:*:*:wordpress:*:*
CWE CWE-434
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Adsanityplugin adsanity
Adsanityplugin

07 Jun 2023, 02:44

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-07 02:15

Updated : 2024-11-21 07:36


NVD link : CVE-2022-4949

Mitre link : CVE-2022-4949

CVE.ORG link : CVE-2022-4949


JSON object : View

Products Affected

xen

  • xen

adsanityplugin

  • adsanity
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type