{"api_version":"1","generated_at":"2026-04-23T02:25:08+00:00","cve":"CVE-2022-4298","urls":{"html":"https://cve.report/CVE-2022-4298","api":"https://cve.report/api/cve/CVE-2022-4298.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-4298","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-4298"},"summary":{"title":"CVE-2022-4298","description":"The Wholesale Market WordPress plugin before 2.2.1 does not have authorisation check, as well as does not validate user input used to generate system path, allowing unauthenticated attackers to download arbitrary file from the server.","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2023-01-02 22:15:00","updated_at":"2023-11-07 03:57:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/7485ad23-6ea4-4018-88b1-174312a0a478","name":"https://wpscan.com/vulnerability/7485ad23-6ea4-4018-88b1-174312a0a478","refsource":"MISC","tags":[],"title":"Wholesale Market < 2.2.1 - Unauthenticated Arbitrary File Download WordPress Security Vulnerability","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-4298","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4298","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"4298","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cedcommerce","cpe5":"wholesale_market","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-4298","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"The Wholesale Market WordPress plugin before 2.2.1 does not have authorisation check, as well as does not validate user input used to generate system path, allowing unauthenticated attackers to download arbitrary file from the server."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"Wholesale Market","version":{"version_data":[{"version_value":"0","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://wpscan.com/vulnerability/7485ad23-6ea4-4018-88b1-174312a0a478","refsource":"MISC","name":"https://wpscan.com/vulnerability/7485ad23-6ea4-4018-88b1-174312a0a478"}]},"generator":{"engine":"WPScan CVE Generator"},"source":{"discovery":"EXTERNAL"},"credits":[{"lang":"en","value":"cydave"},{"lang":"en","value":"WPScan"}]},"nvd":{"publishedDate":"2023-01-02 22:15:00","lastModifiedDate":"2023-11-07 03:57:00","problem_types":[],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:cedcommerce:wholesale_market:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.2.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}