Simple:Press <= 6.8 - Authenticated (Admin+) Path Traversal to Arbitrary File Modification
Summary
| CVE | CVE-2022-4031 |
|---|---|
| State | PUBLISHED |
| Assigner | Wordfence |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-11-29 21:15:12 UTC |
| Updated | 2026-04-08 17:16:46 UTC |
| Description | The Simple:Press plugin for WordPress is vulnerable to arbitrary file modifications in versions up to, and including, 6.8 via the 'file' parameter which does not properly restrict files to be edited in the context of the plugin. This makes it possible with attackers, with high-level permissions such as an administrator, to supply paths to arbitrary files on the server that can be modified outside of the intended scope of the plugin. |
Risk And Classification
Primary CVSS: v3.1 4.9 MEDIUM from [email protected]
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
Problem Types: CWE-22 | CWE-22 CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 4.9 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N |
| 3.1 | [email protected] | Secondary | 3.8 | LOW | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L |
| 3.1 | CNA | DECLARED | 3.8 | LOW | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
HighUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
HighAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Simple-press | Simple | press | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Simplepress | SimplePress Forum | affected 6.8 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Vulnerability Advisories Continued - Wordfence | af854a3a-2127-422b-91ae-364da2661108 | www.wordfence.com | Third Party Advisory |
| 403 Forbidden | af854a3a-2127-422b-91ae-364da2661108 | plugins.trac.wordpress.org | Patch, Third Party Advisory |
| www.wordfence.com/threat-intel/vulnerabilities/id/1ead1a18-9429-472e-9e88-e792e... | [email protected] | www.wordfence.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Luca Greeb (en)
CNA: Andreas Krüger (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2022-11-29T00:00:00.000Z | Disclosed |
There are currently no legacy QID mappings associated with this CVE.