{"api_version":"1","generated_at":"2026-04-25T02:59:12+00:00","cve":"CVE-2022-2268","urls":{"html":"https://cve.report/CVE-2022-2268","api":"https://cve.report/api/cve/CVE-2022-2268.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-2268","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-2268"},"summary":{"title":"CVE-2022-2268","description":"The Import any XML or CSV File to WordPress plugin before 3.6.8 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-07-04 13:15:00","updated_at":"2022-11-05 03:06:00"},"problem_types":["CWE-434"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/578093db-a025-4148-8c4b-ec2df31743f7","name":"https://wpscan.com/vulnerability/578093db-a025-4148-8c4b-ec2df31743f7","refsource":"MISC","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-2268","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2268","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"moresec","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"2268","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"soflyy","cpe5":"wp_all_import","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2022-2268","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"WP All Import < 3.6.8 - Admin+ Arbitrary File Upload"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Import any XML or CSV File to WordPress","version":{"version_data":[{"version_affected":"<","version_name":"3.6.8","version_value":"3.6.8"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Import any XML or CSV File to WordPress plugin before 3.6.8 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE"}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/578093db-a025-4148-8c4b-ec2df31743f7","name":"https://wpscan.com/vulnerability/578093db-a025-4148-8c4b-ec2df31743f7"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"moresec"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-07-04 13:15:00","lastModifiedDate":"2022-11-05 03:06:00","problem_types":["CWE-434"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:soflyy:wp_all_import:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"3.6.8","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}