cve/2022/CVE-2022-1572.md

19 lines
869 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-1572](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1572)
![](https://img.shields.io/static/v1?label=Product&message=HTML2WP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-862%20Missing%20Authorization&color=brighgreen)
### Description
The HTML2WP WordPress plugin through 1.0.0 does not have authorisation and CSRF checks in an AJAX action, available to any authenticated users such as subscriber, which could allow them to delete arbitrary file
### POC
#### Reference
- https://wpscan.com/vulnerability/9afd1805-d449-4551-986a-f92cb47c95c5
#### Github
- https://github.com/ARPSyndicate/cvemon