### [CVE-2022-4136](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4136) ![](https://img.shields.io/static/v1?label=Product&message=qmpaas%2Fleadshop&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%201.4.16%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-749%20Exposed%20Dangerous%20Method%20or%20Function&color=brighgreen) ### Description Dangerous method exposed which can lead to RCE in qmpass/leadshop v1.4.15 allows an attacker to control the target host by calling any function in leadshop.php via the GET method. ### POC #### Reference - https://huntr.dev/bounties/fe418ae1-7c80-4d91-8a5a-923d60ba78c3 #### Github No PoCs found on GitHub currently.