NA

CVE-2022-4061

Published: 19/12/2022 Updated: 07/11/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The JobBoardWP WordPress plugin prior to 1.2.2 does not properly validate file names and types in its file upload functionalities, allowing unauthenticated users to upload arbitrary files such as PHP.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ultimatemember jobboardwp

Github Repositories

wordpress-exploit Mass Exploit - CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover githubcom/codeb0ss/CVE-2023-38389-PoC Automatic Mass Tool for checking vulnerability in CVE-2022-4060 - WordPress Plugin : User Post Gallery <= 219 - Unauthenticated RCE githubcom/im-hanzou/UPGer CVE-2022-4061 - JobBoardWP

Automatic Mass Tool for check and exploiting vulnerability in CVE-2022-4061 - JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload

JBWPer | CVE-2022-4061 - JobBoardWP Automatic Mass Tool for check and exploiting vulnerability in CVE-2022-4061 - JobBoardWP &lt; 122 - Unauthenticated Arbitrary File Upload Using GNU Parallel You must have parallel for run this tool If you found error like "$'\r': command not found" just do "dos2unix jbwpersh" Install Parallel Linux :

wordpress-exploit Mass Exploit - CVE-2023-38389 &lt; Wordpress &lt; JupiterX Core &lt; Unauthenticated Account Takeover githubcom/codeb0ss/CVE-2023-38389-PoC Automatic Mass Tool for checking vulnerability in CVE-2022-4060 - WordPress Plugin : User Post Gallery &lt;= 219 - Unauthenticated RCE githubcom/im-hanzou/UPGer CVE-2022-4061 - JobBoardWP