5.5
CVSSv2

CVE-2022-0403

Published: 04/04/2022 Updated: 11/04/2022
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P

Vulnerability Summary

The Library File Manager WordPress plugin prior to 5.2.3 is using an outdated version of the elFinder library, which is know to be affected by security issues (CVE-2021-32682), and does not have any authorisation as well as CSRF checks in its connector AJAX action, allowing any authenticated users, such as subscriber to call it. Furthermore, as the options passed to the elFinder library does not restrict any file type, users with a role as low as subscriber can Create/Upload/Delete Arbitrary files and folders.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wpjos library file manager

Github Repositories

Exploit WordPress Library File Manager Plugin Version 522 This PoC describe how to exploit CSRF on WordPress Library File Manager Plugin Version 522 with archive creator payload CVE ID CVE-2022-0403 Description The Library File Manager plugin version 522 has a role configuration screen that grants or not privileges for WordPress users to use its features By default, only