Vulnerability Description
The Web To Print Shop : uDraw WordPress plugin before 3.3.3 does not validate the url parameter in its udraw_convert_url_to_base64 AJAX action (available to both unauthenticated and authenticated users) before using it in the file_get_contents function and returning its content base64 encoded in the response. As a result, unauthenticated users could read arbitrary files on the web server (such as /etc/passwd, wp-config.php etc)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webtoprint | Web To Print Shop\ | < 3.3.3, udraw |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151ExploitThird Party Advisory
- https://wpscan.com/vulnerability/925c4c28-ae94-4684-a365-5f1e34e6c151ExploitThird Party Advisory
FAQ
What is CVE-2022-0656?
CVE-2022-0656 is a vulnerability with a CVSS score of 7.5 (HIGH). The Web To Print Shop : uDraw WordPress plugin before 3.3.3 does not validate the url parameter in its udraw_convert_url_to_base64 AJAX action (available to both unauthenticated and authenticated user...
How severe is CVE-2022-0656?
CVE-2022-0656 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0656?
Check the references section above for vendor advisories and patch information. Affected products include: Webtoprint Web To Print Shop\.