The Team WordPress plugin before 4.1.2 contains a file which could allow any authenticated users to download arbitrary files from the server via a path traversal vector. Furthermore, the file will also be deleted after its content is returned to the user
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/c043916a-92c9-4d02-8cca-1a90e5382b7e | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: WPScan
Published: 2022-08-22T15:04:22
Updated: 2022-08-22T15:04:22
Reserved: 2022-07-27T00:00:00
Link: CVE-2022-2557
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-08-22T15:15:15.483
Modified: 2022-08-23T19:14:53.347
Link: CVE-2022-2557
JSON object: View
Redhat Information
No data.
CWE