CVE-2022-4063

The InPost Gallery WordPress plugin before 2.1.4.1 insecurely uses PHP's extract() function when rendering HTML views, allowing attackers to force the inclusion of malicious files & URLs, which may enable them to run code on servers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pluginus:inpost_gallery:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:34

Type Values Removed Values Added
Summary
  • (es) El complemento de WordPress InPost Gallery anterior a 2.1.4.1 utiliza de forma insegura la función extract() de PHP al representar vistas HTML, lo que permite a los atacantes forzar la inclusión de archivos y archivos maliciosos. URL, que pueden permitirles ejecutar código en servidores.
References () https://wpscan.com/vulnerability/6bb07ec1-f1aa-4f4b-9717-c92f651a90a7 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/6bb07ec1-f1aa-4f4b-9717-c92f651a90a7 - Exploit, Third Party Advisory

Information

Published : 2022-12-19 14:15

Updated : 2025-04-17 14:15


NVD link : CVE-2022-4063

Mitre link : CVE-2022-4063

CVE.ORG link : CVE-2022-4063


JSON object : View

Products Affected

pluginus

  • inpost_gallery
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')