Логотип exploitDog
bind:CVE-2022-3383
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-3383

Количество 2

Количество 2

nvd логотип

CVE-2022-3383

около 3 лет назад

The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the get_option_value_from_callback function that accepts user supplied input and passes it through call_user_func(). This makes it possible for authenticated attackers, with administrative capabilities, to execute code on the server.

CVSS3: 7.2
EPSS: Средний
github логотип

GHSA-j2mc-g8cr-m8pq

около 3 лет назад

The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the get_option_value_from_callback function that accepts user supplied input and passes it through call_user_func(). This makes it possible for authenticated attackers, with administrative capabilities, to execute code on the server.

CVSS3: 7.2
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-3383

The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the get_option_value_from_callback function that accepts user supplied input and passes it through call_user_func(). This makes it possible for authenticated attackers, with administrative capabilities, to execute code on the server.

CVSS3: 7.2
31%
Средний
около 3 лет назад
github логотип
GHSA-j2mc-g8cr-m8pq

The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the get_option_value_from_callback function that accepts user supplied input and passes it through call_user_func(). This makes it possible for authenticated attackers, with administrative capabilities, to execute code on the server.

CVSS3: 7.2
31%
Средний
около 3 лет назад

Уязвимостей на страницу