The Easy Digital Downloads – Simple eCommerce for Selling Digital Files plugin for WordPress is vulnerable to deserialization of untrusted input via the 'upload[file]' parameter in versions up to, and including 3.3.3. This makes it possible for authenticated administrative users to call files using a PHAR wrapper, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present.
References
Configurations
History
07 Feb 2025, 17:08
Type | Values Removed | Values Added |
---|---|---|
First Time |
Awesomemotive
Awesomemotive easy Digital Downloads |
|
References | () https://plugins.trac.wordpress.org/changeset/3154854/easy-digital-downloads/tags/3.3.4/includes/admin/import/import-functions.php - Patch | |
References | () https://plugins.trac.wordpress.org/changeset/3154854/easy-digital-downloads/tags/3.3.4/src/Utils/FileSystem.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/644c8702-08ad-4048-ae91-041f1771f1dc?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:awesomemotive:easy_digital_downloads:*:*:*:*:*:wordpress:*:* |
26 Sep 2024, 13:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 Sep 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-24 03:15
Updated : 2025-02-07 17:08
NVD link : CVE-2022-2439
Mitre link : CVE-2022-2439
CVE.ORG link : CVE-2022-2439
JSON object : View
Products Affected
awesomemotive
- easy_digital_downloads
CWE
CWE-502
Deserialization of Untrusted Data