cve/2022/CVE-2022-4108.md

18 lines
878 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-4108](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4108)
![](https://img.shields.io/static/v1?label=Product&message=Wholesale%20Market%20for%20WooCommerce&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties&color=brighgreen)
### Description
The Wholesale Market for WooCommerce WordPress plugin before 1.0.8 does not validate user input used to generate system path, allowing high privilege users such as admin to download arbitrary file from the server even when they should not be able to (for example in multisite)
### POC
#### Reference
- https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470
#### Github
No PoCs found on GitHub currently.