Vulnerability Description
The Easy Digital Downloads – Simple eCommerce for Selling Digital Files plugin for WordPress is vulnerable to deserialization of untrusted input via the 'upload[file]' parameter in versions up to, and including 3.3.3. This makes it possible for authenticated administrative users to call files using a PHAR wrapper, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Awesomemotive | Easy Digital Downloads | < 3.3.4 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/3154854/easy-digital-downloads/tagsPatch
- https://plugins.trac.wordpress.org/changeset/3154854/easy-digital-downloads/tagsPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/644c8702-08ad-4048-ae9Third Party Advisory
FAQ
What is CVE-2022-2439?
CVE-2022-2439 is a vulnerability with a CVSS score of 7.2 (HIGH). The Easy Digital Downloads – Simple eCommerce for Selling Digital Files plugin for WordPress is vulnerable to deserialization of untrusted input via the 'upload[file]' parameter in versions up to, and...
How severe is CVE-2022-2439?
CVE-2022-2439 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-2439?
Check the references section above for vendor advisories and patch information. Affected products include: Awesomemotive Easy Digital Downloads.