Vulnerability Description
The All-in-One WP Migration plugin for WordPress is vulnerable to arbitrary file deletion via directory traversal due to insufficient file validation via the ~/lib/model/class-ai1wm-backups.php file, in versions up to, and including, 7.58. This can be exploited by administrative users, and users who have access to the site's secret key.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Servmask | All-In-One Wp Migration | <= 7.58 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatchThird Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e58634c3-7fcd-4885-b89
- https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1476Third Party Advisory
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatchThird Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e58634c3-7fcd-4885-b89
- https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1476Third Party Advisory
FAQ
What is CVE-2022-1476?
CVE-2022-1476 is a vulnerability with a CVSS score of 6.6 (MEDIUM). The All-in-One WP Migration plugin for WordPress is vulnerable to arbitrary file deletion via directory traversal due to insufficient file validation via the ~/lib/model/class-ai1wm-backups.php file, ...
How severe is CVE-2022-1476?
CVE-2022-1476 has been rated MEDIUM with a CVSS base score of 6.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1476?
Check the references section above for vendor advisories and patch information. Affected products include: Servmask All-In-One Wp Migration.