### [CVE-2022-0656](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0656) ![](https://img.shields.io/static/v1?label=Product&message=Web%20To%20Print%20Shop%20%3A%20uDraw&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.3.3%3C%203.3.3%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties&color=brighgreen) ### Description The Web To Print Shop : uDraw WordPress plugin before 3.3.3 does not validate the url parameter in its udraw_convert_url_to_base64 AJAX action (available to both unauthenticated and authenticated users) before using it in the file_get_contents function and returning its content base64 encoded in the response. As a result, unauthenticated users could read arbitrary files on the web server (such as /etc/passwd, wp-config.php etc) ### POC #### Reference - https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/cyllective/CVEs