Lucene search

K
cvelistWPScanCVELIST:CVE-2022-0537
HistoryApr 04, 2022 - 3:35 p.m.

CVE-2022-0537 MapPress Maps for WordPress < 2.73.13 - Admin+ File Upload to Remote Code Execution

2022-04-0415:35:46
CWE-434
WPScan
www.cve.org
1
mappress wordpress rce

EPSS

0.001

Percentile

42.0%

The MapPress Maps for WordPress plugin before 2.73.13 allows a high privileged user to bypass the DISALLOW_FILE_EDIT and DISALLOW_FILE_MODS settings and upload arbitrary files to the site through the “ajax_save” function. The file is written relative to the current 's stylesheet directory, and a .php file extension is added. No validation is performed on the content of the file, triggering an RCE vulnerability by uploading a web shell. Further the name parameter is not sanitized, allowing the payload to be uploaded to any directory to which the server has write access.

CNA Affected

[
  {
    "product": "MapPress Maps for WordPress",
    "vendor": "Unknown",
    "versions": [
      {
        "lessThan": "2.73.13",
        "status": "affected",
        "version": "2.73.13",
        "versionType": "custom"
      }
    ]
  }
]

EPSS

0.001

Percentile

42.0%

Related for CVELIST:CVE-2022-0537