8.1
CVE-2022-3899
- EPSS 0.14%
- Veröffentlicht 16.01.2024 16:15:10
- Zuletzt bearbeitet 02.06.2025 16:15:23
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
3DPrint <= 3.5.4.7 - Cross-Site Request Forgery to Arbitrary File Deletion
The 3dprint WordPress plugin before 3.5.6.9 does not protect against CSRF attacks in the modified version of Tiny File Manager included with the plugin, allowing an attacker to craft a malicious request that will delete any number of files or directories on the target server by tricking a logged in admin into submitting a form.
Mögliche Gegenmaßnahme
3DPrint: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
3DPrint
Version
* - 3.5.4.7
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
3dprint Project ≫ 3dprint SwPlatformwordpress Version < 3.5.6.9
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.14% | 0.34 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.1 | 2.8 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8.1 | 2.8 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.