CVE-2022-2046

The Directorist WordPress plugin before 7.2.3 allows administrators to download other plugins from the same vendor directly to the site, but does not check the URL domain it gets the zip files from. This could allow administrators to run code on the server, which is a problem in multisite configurations.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpwax:directorist:*:*:*:*:*:wordpress:*:*

History

12 Aug 2022, 15:19

Type Values Removed Values Added
References (CONFIRM) https://plugins.trac.wordpress.org/changeset/2752034/directorist?contextall=1&old=2731298&old_path=%2Fdirectorist - (CONFIRM) https://plugins.trac.wordpress.org/changeset/2752034/directorist?contextall=1&old=2731298&old_path=%2Fdirectorist - Third Party Advisory
References (MISC) https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807 - (MISC) https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.9
CPE cpe:2.3:a:wpwax:directorist:*:*:*:*:*:wordpress:*:*

08 Aug 2022, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-08 14:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-2046

Mitre link : CVE-2022-2046

CVE.ORG link : CVE-2022-2046


JSON object : View

Products Affected

wpwax

  • directorist
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type