9.1
CVE-2022-36386
- EPSS 5.77%
- Veröffentlicht 21.09.2022 20:15:10
- Zuletzt bearbeitet 20.02.2025 20:15:35
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
WP All Import <= 3.6.7 - Authenticated (Administrator+) Arbitrary Code Execution
Authenticated Arbitrary Code Execution vulnerability in Soflyy Import any XML or CSV File to WordPress plugin <= 3.6.7 at WordPress.
Mögliche Gegenmaßnahme
WP All Import – XML, CSV & Excel Import: Update to version 3.6.8, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WP All Import – XML, CSV & Excel Import
Version
*-3.6.7
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Soflyy ≫ Wp All Import SwPlatformwordpress Version <= 3.6.7
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 5.77% | 0.901 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
| audit@patchstack.com | 9.1 | 2.3 | 6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.