CVE-2022-4327
CVSS V2 None
CVSS V3 None
Description
This issue does not bear any security risk as it's only exploitable by users with administrator or super-administrator roles, who can already do what they want on their site.
Overview
- CVE ID
- CVE-2022-4327
- Assigner
- contact@wpscan.com
- Vulnerability Status
- Modified
- Published Version
- 2023-01-16T16:15:11
- Last Modified Date
- 2023-01-30T16:15:09
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:anti-malware_security_and_brute-force_firewall_project:anti-malware_security_and_brute-force_firewall:*:*:*:*:*:wordpress:*:* | 1 | OR | 4.21.85 |
References
Reference URL | Reference Tags |
---|---|
https://wpscan.com/vulnerability/2c94e7b6-a9dd-47d4-bb17-20acb072c825 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-4327 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4327 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-16 16:16:57 | Added to TrackCVE | |||
2023-01-16 16:16:59 | Weakness Enumeration | new | ||
2023-01-17 14:15:12 | 2023-01-17T13:24:41 | CVE Modified Date | updated | |
2023-01-17 14:15:12 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-22 18:12:23 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-24 20:13:51 | 2023-01-24T19:34:04 | CVE Modified Date | updated | |
2023-01-24 20:13:51 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-24 20:13:53 | CPE Information | updated | ||
2023-01-30 17:14:46 | 2023-01-30T16:15:09 | CVE Modified Date | updated | |
2023-01-30 17:14:46 | Analyzed | Undergoing Analysis | Vulnerability Status | updated |
2023-01-30 17:14:48 | The Anti-Malware Security and Brute-Force Firewall WordPress plugin through 4.21.85 is prone to a PHP Object Injection vulnerability due to the unsafe use of unserialize() function. A potential attacker, authenticated as high privilege user could exploit this vulnerability by sending specially crafted requests to the web application containing malicious serialized input. | This issue does not bear any security risk as it's only exploitable by users with administrator or super-administrator roles, who can already do what they want on their site. | Description | updated |
2023-02-28 21:15:26 | Undergoing Analysis | Modified | Vulnerability Status | updated |