CVE-2022-2981

The Download Monitor WordPress plugin before 4.5.98 does not ensure that files to be downloaded are inside the blog folders, and not sensitive, allowing high privilege users such as admin to download the wp-config.php or /etc/passwd even in an hardened environment or multisite setup.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:*

History

12 Oct 2022, 18:44

Type Values Removed Values Added
First Time Wpchill
Wpchill download Monitor
CPE cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.9
References (MISC) https://wpscan.com/vulnerability/30ce32ce-161c-4388-8d22-751350b7b305 - (MISC) https://wpscan.com/vulnerability/30ce32ce-161c-4388-8d22-751350b7b305 - Exploit, Third Party Advisory

10 Oct 2022, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-10 21:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-2981

Mitre link : CVE-2022-2981

CVE.ORG link : CVE-2022-2981


JSON object : View

Products Affected

wpchill

  • download_monitor
CWE
CWE-552

Files or Directories Accessible to External Parties