Plugin Vulnerability Could Allow Authenticated Users to Perform Malicious Actions
CVE-2022-2439
7.2HIGH
Key Information
- Vendor
- Smub
- Status
- Easy Digital Downloads – Ecommerce Payments And Subscriptions Made Easy
- Vendor
- CVE Published:
- 24 September 2024
Summary
The Easy Digital Downloads – Simple eCommerce for Selling Digital Files plugin for WordPress is vulnerable to deserialization of untrusted input via the 'upload[file]' parameter in versions up to, and including 3.3.3. This makes it possible for authenticated administrative users to call files using a PHAR wrapper, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present.
Affected Version(s)
Easy Digital Downloads – eCommerce Payments and Subscriptions made easy <= 3.3.3
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published.
Disclosed
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database
Credit
Rasoul Jahanshahi