NA

CVE-2022-1565

Published: 18/07/2022 Updated: 07/11/2023
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 0

Vulnerability Summary

The plugin WP All Import is vulnerable to arbitrary file uploads due to missing file type validation via the wp_all_import_get_gz.php file in versions up to, and including, 3.6.7. This makes it possible for authenticated attackers, with administrator level permissions and above, to upload arbitrary files on the affected sites server which may make remote code execution possible.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wpallimport wp all import

Exploits

WordPress WP All Import plugin versions 367 and below remote code execution exploit ...

Github Repositories

WordPress Plugin WP All Import <= 3.6.7 - Remote Code Execution (RCE) (Authenticated)

WordPress Plugin WP All Import &lt;= 367 - Remote Code Execution (RCE) (Authenticated) Date: November 05 2022 Exploit Author: AkuCyberSec (githubcom/AkuCyberSec) Vendor Homepage: wwwwpallimportcom/ Software Link: wordpressorg/plugins/wp-all-import/advanced/ (scroll down to select the version) Version: &lt;= 367 (tested: 367) Tested on:

WordPress Plugin WP All Import <= 3.6.7 - Remote Code Execution (RCE) (Authenticated)

WordPress Plugin WP All Import &lt;= 367 - Remote Code Execution (RCE) (Authenticated) Date: November 05 2022 Exploit Author: AkuCyberSec (githubcom/AkuCyberSec) Vendor Homepage: wwwwpallimportcom/ Software Link: wordpressorg/plugins/wp-all-import/advanced/ (scroll down to select the version) Version: &lt;= 367 (tested: 367) Tested on: