{"api_version":"1","generated_at":"2026-04-23T02:24:44+00:00","cve":"CVE-2022-4108","urls":{"html":"https://cve.report/CVE-2022-4108","api":"https://cve.report/api/cve/CVE-2022-4108.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-4108","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-4108"},"summary":{"title":"CVE-2022-4108","description":"The Wholesale Market for WooCommerce WordPress plugin before 1.0.8 does not validate user input used to generate system path, allowing high privilege users such as admin to download arbitrary file from the server even when they should not be able to (for example in multisite)","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2022-12-19 14:15:00","updated_at":"2023-11-07 03:56:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470","name":"https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470","refsource":"MISC","tags":[],"title":"Wholesale Market for WooCommerce < 1.0.8 - Admin+ Arbitrary File Download WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-4108","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4108","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"4108","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cedcommerce","cpe5":"wholesale_market_for_woocommerce","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-4108","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Wholesale Market for WooCommerce WordPress plugin before 1.0.8 does not validate user input used to generate system path, allowing high privilege users such as admin to download arbitrary file from the server even when they should not be able to (for example in multisite)"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-552 Files or Directories Accessible to External Parties"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Wholesale Market for WooCommerce","version":{"version_data":[{"version_value":"0","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470","refsource":"MISC","name":"https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"WPScan"}]},"nvd":{"publishedDate":"2022-12-19 14:15:00","lastModifiedDate":"2023-11-07 03:56:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.2,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cedcommerce:wholesale_market_for_woocommerce:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.0.8","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}