CVE-2022-2554
Summary
| CVE | CVE-2022-2554 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-10-10 21:15:00 UTC |
| Updated | 2022-10-11 18:01:00 UTC |
| Description | The Enable Media Replace WordPress plugin before 4.0.0 does not ensure that renamed files are moved to the Upload folder, which could allow high privilege users such as admin to move them outside to the web root directory via a path traversal attack for example |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Shortpixel | Enable Media Replace | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Enable Media Replace < 4.0.0 - Admin+ Path Traversal WordPress Security Vulnerability | MISC | wpscan.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Raad Haddad of Cloudyrion GmbH
There are currently no legacy QID mappings associated with this CVE.