Lucene search

K
cve[email protected]CVE-2022-4031
HistoryNov 29, 2022 - 9:15 p.m.

CVE-2022-4031

2022-11-2921:15:12
CWE-22
web.nvd.nist.gov
25
2
simple:press
wordpress
plugin vulnerability
arbitrary file modifications
nvd
cve-2022-4031

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.8%

The Simple:Press plugin for WordPress is vulnerable to arbitrary file modifications in versions up to, and including, 6.8 via the ‘file’ parameter which does not properly restrict files to be edited in the context of the plugin. This makes it possible with attackers, with high-level permissions such as an administrator, to supply paths to arbitrary files on the server that can be modified outside of the intended scope of the plugin.

Affected configurations

Vulners
NVD
Node
simplepresssimple\Matchpress_–_wordpress_forum_plugin

CNA Affected

[
  {
    "vendor": "simplepress",
    "product": "Simple:Press – WordPress Forum Plugin",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "6.8",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

Social References

More

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.8%

Related for CVE-2022-4031