{"api_version":"1","generated_at":"2026-04-23T16:54:38+00:00","cve":"CVE-2022-2903","urls":{"html":"https://cve.report/CVE-2022-2903","api":"https://cve.report/api/cve/CVE-2022-2903.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-2903","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-2903"},"summary":{"title":"CVE-2022-2903","description":"The Ninja Forms Contact Form WordPress plugin before 3.6.13 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-09-26 13:15:00","updated_at":"2022-09-28 17:34:00"},"problem_types":["CWE-502"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864","name":"https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864","refsource":"MISC","tags":[],"title":"NinjaForms < 3.6.13 - Admin+ PHP Objection Injection WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-2903","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2903","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Alessio Santoru","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"2903","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ninjaforms","cpe5":"ninja_forms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-2903","qid":"150638","title":"WordPress Ninja Forms Plugin: Deserialization Vulnerability (CVE-2022-2903)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2022-2903","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"NinjaForms < 3.6.13 - Admin+ PHP Objection Injection"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress","version":{"version_data":[{"version_affected":"<","version_name":"3.6.13","version_value":"3.6.13"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Ninja Forms Contact Form WordPress plugin before 3.6.13 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog."}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864","name":"https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-502 Deserialization of Untrusted Data","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Alessio Santoru"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-09-26 13:15:00","lastModifiedDate":"2022-09-28 17:34:00","problem_types":["CWE-502"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"3.6.13","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}