{"api_version":"1","generated_at":"2026-04-23T11:34:47+00:00","cve":"CVE-2022-3335","urls":{"html":"https://cve.report/CVE-2022-3335","api":"https://cve.report/api/cve/CVE-2022-3335.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-3335","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-3335"},"summary":{"title":"CVE-2022-3335","description":"The Kadence WooCommerce Email Designer WordPress plugin before 1.5.7 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-10-25 17:15:00","updated_at":"2022-10-26 01:41:00"},"problem_types":["CWE-502"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/39514705-c887-4a02-a77b-36e1dcca8f5d","name":"https://wpscan.com/vulnerability/39514705-c887-4a02-a77b-36e1dcca8f5d","refsource":"CONFIRM","tags":[],"title":"Kadence WooCommerce Email Designer < 1.5.7 - Admin+ PHP Objection Injection WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-3335","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3335","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Nguyen Duy Quoc Khanh","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"3335","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kadencewp","cpe5":"kadence_woocommerce_email_designer","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2022-3335","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"Kadence WooCommerce Email Designer < 1.5.7 - Admin+ PHP Objection Injection"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Kadence WooCommerce Email Designer","version":{"version_data":[{"version_affected":"<","version_name":"1.5.7","version_value":"1.5.7"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The Kadence WooCommerce Email Designer WordPress plugin before 1.5.7 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog."}]},"references":{"reference_data":[{"refsource":"CONFIRM","url":"https://wpscan.com/vulnerability/39514705-c887-4a02-a77b-36e1dcca8f5d","name":"https://wpscan.com/vulnerability/39514705-c887-4a02-a77b-36e1dcca8f5d"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-502 Deserialization of Untrusted Data","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Nguyen Duy Quoc Khanh"}],"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-10-25 17:15:00","lastModifiedDate":"2022-10-26 01:41:00","problem_types":["CWE-502"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:kadencewp:kadence_woocommerce_email_designer:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.5.7","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}