8.8

CVE-2022-0687

Exploit

Appointment and Event Booking Calendar - Amelia < 1.0.47 - Arbitrary File Upload

The Amelia WordPress plugin before 1.0.47 stores image blobs into actual files whose extension is controlled by the user, which may lead to PHP backdoors being uploaded onto the site. This vulnerability can be exploited by logged-in users with the custom "Amelia Manager" role.
Mögliche Gegenmaßnahme
Booking for Appointments and Events Calendar – Amelia: Update to version 1.0.47, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Booking for Appointments and Events Calendar – Amelia
Version [*, 1.0.47)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Tms-outsourceAmelia SwPlatformwordpress Version < 1.0.47
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.82% 0.736
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 6.5 8 6.4
AV:N/AC:L/Au:S/C:P/I:P/A:P
CWE-434 Unrestricted Upload of File with Dangerous Type

The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.