445
VMScore

CVE-2022-1119

Published: 19/04/2022 Updated: 11/01/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated malicious users to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

simplefilelist simple-file-list

Github Repositories

WordPress Simple File List FileRead POC

CVE-2022-1119 1简介 WordPress Simple File List < 328 FileRead POC 2用法 poc -f hosttxt // 批量扫描 poc -h 19216811 // 单个扫描 3免责声明 此工具仅用于学习、研究和自查。 不应用于非法目的,请遵守相关法律法规。 使用本工具产生的任何风险与本人无关!