### [CVE-2022-0442](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0442) ![](https://img.shields.io/static/v1?label=Product&message=UsersWP%20%E2%80%93%20User%20Registration%20%26%20User%20Profile&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.2.3.1%3C%201.2.3.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key&color=brighgreen) ### Description The UsersWP WordPress plugin before 1.2.3.1 is missing access controls when updating a user avatar, and does not make sure file names for user avatars are unique, allowing a logged in user to overwrite another users avatar. ### POC #### Reference - https://wpscan.com/vulnerability/9cf0822a-c9d6-4ebc-b905-95b143d1a692 - https://wpscan.com/vulnerability/9cf0822a-c9d6-4ebc-b905-95b143d1a692 #### Github No PoCs found on GitHub currently.