7.2

CVE-2022-0440

Exploit

Catch Themes Demo Import <= 2.1 - Authenticated (Admin+) Arbitrary File Upload

The Catch Themes Demo Import WordPress plugin before 2.1.1 does not validate one of the file to be imported, which could allow high privivilege admin to upload an arbitrary PHP file and gain RCE even in the case of an hardened blog (ie DISALLOW_UNFILTERED_HTML, DISALLOW_FILE_EDIT and DISALLOW_FILE_MODS constants set to true)
Mögliche Gegenmaßnahme
Catch Themes Demo Import: Update to version 2.1.1, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Catch Themes Demo Import
Version [*, 2.1.1)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CatchpluginsCatch Themes Demo Import SwPlatformwordpress Version < 2.1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.88% 0.744
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.5 8 6.4
AV:N/AC:L/Au:S/C:P/I:P/A:P
CWE-434 Unrestricted Upload of File with Dangerous Type

The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.