CVE-2022-2222

The Download Monitor WordPress plugin before 4.5.91 does not ensure that files to be downloaded are inside the blog folders, and not sensitive, allowing high privilege users such as admin to download the wp-config.php or /etc/passwd even in an hardened environment or multisite setup.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:*

History

18 Jul 2022, 13:51

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 4.9
CPE cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:*
References (MISC) https://wpscan.com/vulnerability/dd48624a-1781-419c-a3c4-1e3eaf5e2c1b - (MISC) https://wpscan.com/vulnerability/dd48624a-1781-419c-a3c4-1e3eaf5e2c1b - Exploit, Third Party Advisory

17 Jul 2022, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-17 11:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-2222

Mitre link : CVE-2022-2222

CVE.ORG link : CVE-2022-2222


JSON object : View

Products Affected

wpchill

  • download_monitor
CWE
CWE-552

Files or Directories Accessible to External Parties