cve/2022/CVE-2022-2184.md

19 lines
996 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-2184](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2184)
![](https://img.shields.io/static/v1?label=Product&message=CAPTCHA%204WP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=7.1.0%3C%207.1.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)&color=brighgreen)
### Description
The CAPTCHA 4WP WordPress plugin before 7.1.0 lets user input reach a sensitive require_once call in one of its admin-side templates. This can be abused by attackers, via a Cross-Site Request Forgery attack to run arbitrary code on the server.
### POC
#### Reference
- https://wpscan.com/vulnerability/e777784f-5ba0-4966-be27-e0a0cbbfe056
#### Github
No PoCs found on GitHub currently.