Lucene search

K
cvelistWordfenceCVELIST:CVE-2022-4949
HistoryJun 07, 2023 - 1:51 a.m.

CVE-2022-4949

2023-06-0701:51:50
Wordfence
www.cve.org
1
adsanity
wordpress
file uploads
arbitrary
security vulnerability
remote code execution
cve-2022-4949

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

71.9%

The AdSanity plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ‘ajax_upload’ function in versions up to, and including, 1.8.1. This makes it possible for authenticated attackers with Contributor+ level privileges to upload arbitrary files on the affected sites server which makes remote code execution possible.

CNA Affected

[
  {
    "vendor": "https://adsanityplugin.com/",
    "product": "AdSanity",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThan": "1.8.2",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

71.9%

Related for CVELIST:CVE-2022-4949