Lucene search

K
cveWPScanCVE-2022-3282
HistoryOct 17, 2022 - 12:15 p.m.

CVE-2022-3282

2022-10-1712:15:10
CWE-639
WPScan
web.nvd.nist.gov
38
4
cve-2022-3282
wordpress
plugin
file upload
vulnerability
bypass limit

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

4.7

Confidence

High

EPSS

0.001

Percentile

24.8%

The Drag and Drop Multiple File Upload WordPress plugin before 1.3.6.5 does not properly check for the upload size limit set in forms, taking the value from user input sent when submitting the form. As a result, attackers could control the file length limit and bypass the limit set by admins in the contact form.

Affected configurations

Nvd
Vulners
Node
codedropzdrag_and_drop_multiple_file_upload_-_contact_form_7Range<1.3.6.5wordpress
VendorProductVersionCPE
codedropzdrag_and_drop_multiple_file_upload_-_contact_form_7*cpe:2.3:a:codedropz:drag_and_drop_multiple_file_upload_-_contact_form_7:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "Unknown",
    "product": "Drag and Drop Multiple File Upload – Contact Form 7",
    "versions": [
      {
        "version": "1.3.6.5",
        "status": "affected",
        "lessThan": "1.3.6.5",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

AI Score

4.7

Confidence

High

EPSS

0.001

Percentile

24.8%