Vulnerability Description
The User Meta WordPress plugin before 2.4.4 does not validate the filepath parameter of its um_show_uploaded_file AJAX action, which could allow low privileged users such as subscriber to enumerate the local files on the web server via path traversal payloads
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| User-Meta | User Meta User Profile Builder And User Management | < 2.4.4 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/9d4a3f09-b011-4d87-ab63-332e505cf1cdExploitThird Party Advisory
- https://wpscan.com/vulnerability/9d4a3f09-b011-4d87-ab63-332e505cf1cdExploitThird Party Advisory
FAQ
What is CVE-2022-0779?
CVE-2022-0779 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The User Meta WordPress plugin before 2.4.4 does not validate the filepath parameter of its um_show_uploaded_file AJAX action, which could allow low privileged users such as subscriber to enumerate th...
How severe is CVE-2022-0779?
CVE-2022-0779 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0779?
Check the references section above for vendor advisories and patch information. Affected products include: User-Meta User Meta User Profile Builder And User Management.