cve/2022/CVE-2022-4108.md
2024-06-18 02:51:15 +02:00

18 lines
878 B
Markdown

### [CVE-2022-4108](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4108)
![](https://img.shields.io/static/v1?label=Product&message=Wholesale%20Market%20for%20WooCommerce&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties&color=brighgreen)
### Description
The Wholesale Market for WooCommerce WordPress plugin before 1.0.8 does not validate user input used to generate system path, allowing high privilege users such as admin to download arbitrary file from the server even when they should not be able to (for example in multisite)
### POC
#### Reference
- https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470
#### Github
No PoCs found on GitHub currently.