CVE-2022-3384
🟡 Monitoruj
Wtyczka Ultimate Member dla WordPressa umożliwia zdalne wykonanie kodu przez atakujących z uprawnieniami administratora.
CVSS
7.2
EPSS
38.4%
Exploit
poc
Vendor
ultimatemember
Opis źródłowy (NVD)
The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the populate_dropdown_options function that accepts user supplied input and passes it through call_user_func(). This is restricted to non-parameter PHP functions like phpinfo(); since user supplied parameters are not passed through the function. This makes it possible for authenticated attackers, with administrative privileges, to execute code on the server.
exploit rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.2 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 38.4% |
| Opublikowano (NVD) | 2022-11-29 21:15:11 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 19:17:52 UTC |
Referencje
- https://github.com/H4de5-7/vulnerabilities/blob/main/CVE-2022-3383%20%26%26%20CVE-2022-3384.md (security@wordfence.com) [Exploit, Third Party Advisory]
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2805393%40ultimate-member&new=2805393%40ultimate-member&sfp_email=&sfph_mail= (security@wordfence.com) [Patch, Third Party Advisory]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/cdcdbba7-8280-457b-a511-66a486978a31?source=cve (security@wordfence.com)
- https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3384 (security@wordfence.com) [Third Party Advisory]
- https://www.yuque.com/docs/share/8796eef9-ac4c-4339-96b4-6c21313ecf3e (security@wordfence.com) [Exploit, Third Party Advisory]