{"api_version":"1","generated_at":"2026-04-23T13:26:24+00:00","cve":"CVE-2022-2554","urls":{"html":"https://cve.report/CVE-2022-2554","api":"https://cve.report/api/cve/CVE-2022-2554.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-2554","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-2554"},"summary":{"title":"CVE-2022-2554","description":"The Enable Media Replace WordPress plugin before 4.0.0 does not ensure that renamed files are moved to the Upload folder, which could allow high privilege users such as admin to move them outside to the web root directory via a path traversal attack for example","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-10-10 21:15:00","updated_at":"2022-10-11 18:01:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9","name":"https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9","refsource":"MISC","tags":[],"title":"Enable Media Replace < 4.0.0 - Admin+ Path Traversal WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-2554","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2554","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Raad Haddad of Cloudyrion GmbH","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"2554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"shortpixel","cpe5":"enable_media_replace","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2022-2554","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Enable Media Replace < 4.0.0 - Admin+ Path Traversal"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Enable Media Replace","version":{"version_data":[{"version_affected":"<","version_name":"4.0.0","version_value":"4.0.0"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Enable Media Replace WordPress plugin before 4.0.0 does not ensure that renamed files are moved to the Upload folder, which could allow high privilege users such as admin to move them outside to the web root directory via a path traversal attack for example"}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9","name":"https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Raad Haddad of Cloudyrion GmbH"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-10-10 21:15:00","lastModifiedDate":"2022-10-11 18:01:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":4.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.2,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:shortpixel:enable_media_replace:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"4.0.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}