CVE-2022-4949
🟠 Łataj w tym tygodniu
Brak walidacji typów plików w wtyczce AdSanity pozwala na zdalne wykonanie kodu.
CVSS
8.8
EPSS
8.6%
Exploit
poc
Vendor
adsanityplugin
Opis źródłowy (NVD)
The AdSanity plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'ajax_upload' function in versions up to, and including, 1.8.1. This makes it possible for authenticated attackers with Contributor+ level privileges to upload arbitrary files on the affected sites server which makes remote code execution possible.
exploit rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 8.6% |
| Opublikowano (NVD) | 2023-06-07 02:15:15 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 19:17:58 UTC |
Referencje
- https://blog.nintechnet.com/critical-vulnerability-in-wordpress-adsanity-plugin/ (security@wordfence.com) [Exploit]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/effd72d2-876d-4f8d-b1e4-5ab38eab401b?source=cve (security@wordfence.com) [Third Party Advisory]
- http://www.openwall.com/lists/oss-security/2023/11/09/3 (af854a3a-2127-422b-91ae-364da2661108) [Mailing List]
- http://xenbits.xen.org/xsa/advisory-443.html (af854a3a-2127-422b-91ae-364da2661108) [Patch, Third Party Advisory]