{"api_version":"1","generated_at":"2026-04-23T16:55:42+00:00","cve":"CVE-2022-2633","urls":{"html":"https://cve.report/CVE-2022-2633","api":"https://cve.report/api/cve/CVE-2022-2633.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-2633","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-2633"},"summary":{"title":"CVE-2022-2633","description":"The All-in-One Video Gallery plugin for WordPress is vulnerable to arbitrary file downloads and blind server-side request forgery via the 'dl' parameter found in the ~/public/video.php file in versions up to, and including 2.6.0. This makes it possible for unauthenticated users to download sensitive files hosted on the affected server and forge requests to the server.","state":"PUBLIC","assigner":"security@wordfence.com","published_at":"2022-09-06 18:15:00","updated_at":"2024-01-11 09:15:00"},"problem_types":["CWE-610"],"metrics":[],"references":[{"url":"https://plugins.trac.wordpress.org/changeset/2768384/all-in-one-video-gallery/trunk/public/video.php","name":"https://plugins.trac.wordpress.org/changeset/2768384/all-in-one-video-gallery/trunk/public/video.php","refsource":"MISC","tags":[],"title":"403 Forbidden","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2744708%40all-in-one-video-gallery&new=2744708%40all-in-one-video-gallery&sfp_email=&sfph_mail=","name":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2744708%40all-in-one-video-gallery&new=2744708%40all-in-one-video-gallery&sfp_email=&sfph_mail=","refsource":"MISC","tags":[],"title":"403 Forbidden","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://plugins.trac.wordpress.org/browser/all-in-one-video-gallery/trunk/public/video.php#L227","name":"https://plugins.trac.wordpress.org/browser/all-in-one-video-gallery/trunk/public/video.php#L227","refsource":"MISC","tags":[],"title":"403 Forbidden","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2633","name":"https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2633","refsource":"MISC","tags":[],"title":"Vulnerability Advisories - Wordfence","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/83b0534e-1b8d-46a8-9698-e7ca73e5ab57?source=cve","name":"https://www.wordfence.com/threat-intel/vulnerabilities/id/83b0534e-1b8d-46a8-9698-e7ca73e5ab57?source=cve","refsource":"","tags":[],"title":"All-in-One Video Gallery 2.5.8 - 2.6.0 - Arbitrary File Download & Server-Side Request Forgery","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-2633","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2633","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Gabriele Zuddas","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"2633","vulnerable":"1","versionEndIncluding":"2.6.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"plugins360","cpe5":"all-in-one_video_gallery","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-2633","qid":"730628","title":"WordPress Plugin All In One Video Gallery Blind Server-Side Request Forgery (SSRF) Vulnerability"}]},"source_records":{"cve_program":{"CVE_data_meta":{"AKA":"Wordfence","ASSIGNER":"security@wordfence.com","ID":"CVE-2022-2633","STATE":"PUBLIC","TITLE":"All-in-One Video Gallery 2.5.8 - 2.6.0 - Arbitrary File Download & Server-Side Request Forgery"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"All-in-One Video Gallery","version":{"version_data":[{"version_affected":"=","version_name":"2.5.8","version_value":"2.5.8"},{"version_affected":"=","version_name":"2.5.9","version_value":"2.5.9"},{"version_affected":"=","version_name":"2.6.0","version_value":"2.6.0"}]}}]},"vendor_name":"plugins360"}]}},"credit":[{"lang":"eng","value":"Gabriele Zuddas"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The All-in-One Video Gallery plugin for WordPress is vulnerable to arbitrary file downloads and blind server-side request forgery via the 'dl' parameter found in the ~/public/video.php file in versions up to, and including 2.6.0. This makes it possible for unauthenticated users to download sensitive files hosted on the affected server and forge requests to the server."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-918 Server-Side Request Forgery (SSRF)"}]},{"description":[{"lang":"eng","value":"CWE-73 External Control of File Name or Path"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://plugins.trac.wordpress.org/browser/all-in-one-video-gallery/trunk/public/video.php#L227","name":"https://plugins.trac.wordpress.org/browser/all-in-one-video-gallery/trunk/public/video.php#L227"},{"refsource":"MISC","url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2744708%40all-in-one-video-gallery&new=2744708%40all-in-one-video-gallery&sfp_email=&sfph_mail=","name":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2744708%40all-in-one-video-gallery&new=2744708%40all-in-one-video-gallery&sfp_email=&sfph_mail="},{"refsource":"MISC","url":"https://plugins.trac.wordpress.org/changeset/2768384/all-in-one-video-gallery/trunk/public/video.php","name":"https://plugins.trac.wordpress.org/changeset/2768384/all-in-one-video-gallery/trunk/public/video.php"},{"refsource":"MISC","url":"https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2633","name":"https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2633"}]},"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-09-06 18:15:00","lastModifiedDate":"2024-01-11 09:15:00","problem_types":["CWE-610"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:plugins360:all-in-one_video_gallery:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"2.5.8","versionEndIncluding":"2.6.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}