CVE-2022-1476

The All-in-One WP Migration plugin for WordPress is vulnerable to arbitrary file deletion via directory traversal due to insufficient file validation via the ~/lib/model/class-ai1wm-backups.php file, in versions up to, and including, 7.58. This can be exploited by administrative users, and users who have access to the site's secret key.
Configurations

Configuration 1 (hide)

cpe:2.3:a:servmask:all-in-one_wp_migration:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 06:40

Type Values Removed Values Added
CVSS v2 : 5.5
v3 : 6.5
v2 : 5.5
v3 : 6.6
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2715609%40all-in-one-wp-migration&new=2715609%40all-in-one-wp-migration&sfp_email=&sfph_mail= - Patch, Third Party Advisory () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2715609%40all-in-one-wp-migration&new=2715609%40all-in-one-wp-migration&sfp_email=&sfph_mail= - Patch, Third Party Advisory
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/e58634c3-7fcd-4885-b897-4e6a97fb06ac?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/e58634c3-7fcd-4885-b897-4e6a97fb06ac?source=cve -
References () https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1476 - Third Party Advisory () https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1476 - Third Party Advisory

11 Jan 2024, 09:15

Type Values Removed Values Added
CWE CWE-22
References
  • () https://www.wordfence.com/threat-intel/vulnerabilities/id/e58634c3-7fcd-4885-b897-4e6a97fb06ac?source=cve -

Information

Published : 2022-05-10 20:15

Updated : 2024-11-21 06:40


NVD link : CVE-2022-1476

Mitre link : CVE-2022-1476

CVE.ORG link : CVE-2022-1476


JSON object : View

Products Affected

servmask

  • all-in-one_wp_migration
CWE

No CWE.