CVE-2022-0687

The Amelia WordPress plugin before 1.0.47 stores image blobs into actual files whose extension is controlled by the user, which may lead to PHP backdoors being uploaded onto the site. This vulnerability can be exploited by logged-in users with the custom "Amelia Manager" role.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:tms-outsource:amelia:*:*:*:*:*:wordpress:*:*

History

28 Mar 2022, 19:02

Type Values Removed Values Added
CPE cpe:2.3:a:tms-outsource:amelia:*:*:*:*:*:wordpress:*:*
CWE CWE-94 CWE-434
References (MISC) https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c - (MISC) https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8

21 Mar 2022, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-21 19:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-0687

Mitre link : CVE-2022-0687

CVE.ORG link : CVE-2022-0687


JSON object : View

Products Affected

tms-outsource

  • amelia
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type