Vulnerability Description
Vulnerable versions of the Jupiter (<= 6.10.1) and JupiterX (<= 2.0.6) Themes allow logged-in users, including subscriber-level users, to perform Path Traversal and Local File inclusion. In the JupiterX theme, the jupiterx_cp_load_pane_action AJAX action present in the lib/admin/control-panel/control-panel.php file calls the load_control_panel_pane function. It is possible to use this action to include any local PHP file via the slug parameter. The Jupiter theme has a nearly identical vulnerability which can be exploited via the mka_cp_load_pane_action AJAX action present in the framework/admin/control-panel/logic/functions.php file, which calls the mka_cp_load_pane_action function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Artbees | Jupiter | <= 6.10.1 |
| Artbees | Jupiterx | <= 2.0.6 |
Related Weaknesses (CWE)
References
- https://www.wordfence.com/blog/2022/05/critical-privilege-escalation-vulnerabiliExploitThird Party Advisory
- https://www.wordfence.com/blog/2022/05/critical-privilege-escalation-vulnerabiliExploitThird Party Advisory
FAQ
What is CVE-2022-1657?
CVE-2022-1657 is a vulnerability with a CVSS score of 8.8 (HIGH). Vulnerable versions of the Jupiter (<= 6.10.1) and JupiterX (<= 2.0.6) Themes allow logged-in users, including subscriber-level users, to perform Path Traversal and Local File inclusion. In the Jupite...
How severe is CVE-2022-1657?
CVE-2022-1657 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1657?
Check the references section above for vendor advisories and patch information. Affected products include: Artbees Jupiter, Artbees Jupiterx.