CVE-2022-3966
CVSS V2 None
CVSS V3 High 7.5
Description
A vulnerability, which was classified as critical, has been found in Ultimate Member Plugin up to 2.5.0. This issue affects the function load_template of the file includes/core/class-shortcodes.php of the component Template Handler. The manipulation of the argument tpl leads to pathname traversal. The attack may be initiated remotely. Upgrading to version 2.5.1 is able to address this issue. The name of the patch is e1bc94c1100f02a129721ba4be5fbc44c3d78ec4. It is recommended to upgrade the affected component. The identifier VDB-213545 was assigned to this vulnerability.
Overview
- CVE ID
- CVE-2022-3966
- Assigner
- cna@vuldb.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-11-13T08:15:15
- Last Modified Date
- 2022-11-17T17:18:07
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:* | 1 | OR | 2.5.1 |
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- NONE
- Base Score
- 7.5
- Base Severity
- HIGH
- Exploitability Score
- 3.9
- Impact Score
- 3.6
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-3966 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3966 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-11-13 09:00:09 | Added to TrackCVE | |||
2022-12-07 17:40:42 | 2022-11-13T08:15Z | 2022-11-13T08:15:15 | CVE Published Date | updated |
2022-12-07 17:40:42 | 2022-11-17T17:18:07 | CVE Modified Date | updated | |
2022-12-07 17:40:42 | Analyzed | Vulnerability Status | updated | |
2022-12-07 17:40:44 | CPE Information | updated |