{"api_version":"1","generated_at":"2026-04-21T18:03:30+00:00","cve":"CVE-2022-0687","urls":{"html":"https://cve.report/CVE-2022-0687","api":"https://cve.report/api/cve/CVE-2022-0687.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-0687","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-0687"},"summary":{"title":"CVE-2022-0687","description":"The Amelia WordPress plugin before 1.0.47 stores image blobs into actual files whose extension is controlled by the user, which may lead to PHP backdoors being uploaded onto the site. This vulnerability can be exploited by logged-in users with the custom \"Amelia Manager\" role.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-03-21 19:15:00","updated_at":"2022-03-30 19:28:00"},"problem_types":["CWE-434"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c","name":"https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c","refsource":"MISC","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-0687","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0687","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"qerogram","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"687","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tms-outsource","cpe5":"amelia","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2022-0687","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Amelia < 1.0.46 - Manager+ RCE"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Amelia – Events & Appointments Booking Calendar","version":{"version_data":[{"version_affected":"<","version_name":"1.0.47","version_value":"1.0.47"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Amelia WordPress plugin before 1.0.47 stores image blobs into actual files whose extension is controlled by the user, which may lead to PHP backdoors being uploaded onto the site. This vulnerability can be exploited by logged-in users with the custom \"Amelia Manager\" role."}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c","name":"https://wpscan.com/vulnerability/3cf05815-9b74-4491-a935-d69a0834146c"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"qerogram"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-03-21 19:15:00","lastModifiedDate":"2022-03-30 19:28:00","problem_types":["CWE-434"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tms-outsource:amelia:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.0.47","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}