Wedding Planner v1.0 is vulnerable to Arbitrary code execution via package_edit.php.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/Tr0ee/bug_report/blob/main/vendors/pushpam02/wedding-planner/RCE-1.md | Exploit Third Party Advisory | 
| https://github.com/Tr0ee/bug_report/blob/main/vendors/pushpam02/wedding-planner/RCE-1.md | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 07:24
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/Tr0ee/bug_report/blob/main/vendors/pushpam02/wedding-planner/RCE-1.md - Exploit, Third Party Advisory | 
11 Oct 2022, 20:19
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2022-10-11 18:15
Updated : 2025-05-19 21:15
NVD link : CVE-2022-42229
Mitre link : CVE-2022-42229
CVE.ORG link : CVE-2022-42229
JSON object : View
Products Affected
                wedding_planner_project
- wedding_planner
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
