7.2
CVE-2022-1037
- EPSS 0.72%
- Veröffentlicht 18.04.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:39:54
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
EXMAGE – WordPress Image Links <= 1.0.6 - Admin+ Blind SSRF
The EXMAGE WordPress plugin before 1.0.7 does to ensure that images added via URLs are external images, which could lead to a blind SSRF issue by using local URLs
Mögliche Gegenmaßnahme
EXMAGE – WordPress Image Links: Update to version 1.0.7, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
EXMAGE – WordPress Image Links
Version
* - 1.0.6
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Villatheme ≫ Exmage SwPlatformwordpress Version < 1.0.7
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.72% | 0.717 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-918 Server-Side Request Forgery (SSRF)
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.