Vulnerability Description
The Mailchimp for WooCommerce WordPress plugin before 2.7.1 has an AJAX action that allows any logged in users (such as subscriber) to perform a POST request on behalf of the server to the internal network/LAN, the body of the request is also appended to the response so it can be used to scan private network for example
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mailchimp | Mailchimp For Woocommerce | < 2.7.1 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/e3bd9f8c-919a-40af-9e80-607573e71870ExploitThird Party Advisory
- https://wpscan.com/vulnerability/e3bd9f8c-919a-40af-9e80-607573e71870ExploitThird Party Advisory
FAQ
What is CVE-2022-2267?
CVE-2022-2267 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The Mailchimp for WooCommerce WordPress plugin before 2.7.1 has an AJAX action that allows any logged in users (such as subscriber) to perform a POST request on behalf of the server to the internal ne...
How severe is CVE-2022-2267?
CVE-2022-2267 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-2267?
Check the references section above for vendor advisories and patch information. Affected products include: Mailchimp Mailchimp For Woocommerce.