The Download Monitor WordPress plugin before 4.5.91 does not ensure that files to be downloaded are inside the blog folders, and not sensitive, allowing high privilege users such as admin to download the wp-config.php or /etc/passwd even in an hardened environment or multisite setup.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/dd48624a-1781-419c-a3c4-1e3eaf5e2c1b | Exploit Third Party Advisory |
Configurations
History
18 Jul 2022, 13:51
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 4.9 |
CPE | cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://wpscan.com/vulnerability/dd48624a-1781-419c-a3c4-1e3eaf5e2c1b - Exploit, Third Party Advisory |
17 Jul 2022, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-07-17 11:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-2222
Mitre link : CVE-2022-2222
CVE.ORG link : CVE-2022-2222
JSON object : View
Products Affected
wpchill
- download_monitor
CWE
CWE-552
Files or Directories Accessible to External Parties