Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-1390

Опубликовано: 25 апр. 2022
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Критический

Описание

The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:admin_word_count_column_project:admin_word_count_column:*:*:*:*:*:wordpress:*:*
Версия до 2.2 (включая)

EPSS

Процентиль: 100%
0.92036
Критический

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 9.8
github
почти 4 года назад

The Admin Word Count Column WordPress plugin through 2.2 does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique

EPSS

Процентиль: 100%
0.92036
Критический

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-22