Vulnerability Details CVE-2022-2446
The WP Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'current_theme_root' parameter in versions up to, and including 1.2.9. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.012
EPSS Ranking 77.9%
CVSS Severity
CVSS v3 Score 7.2
Products affected by CVE-2022-2446
-
cpe:2.3:a:benjaminrojas:wp_editor:-
-
cpe:2.3:a:benjaminrojas:wp_editor:1.0
-
cpe:2.3:a:benjaminrojas:wp_editor:1.0.1
-
cpe:2.3:a:benjaminrojas:wp_editor:1.0.2
-
cpe:2.3:a:benjaminrojas:wp_editor:1.0.3
-
cpe:2.3:a:benjaminrojas:wp_editor:1.1
-
cpe:2.3:a:benjaminrojas:wp_editor:1.1.0.1
-
cpe:2.3:a:benjaminrojas:wp_editor:1.1.0.2
-
cpe:2.3:a:benjaminrojas:wp_editor:1.1.0.3
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.1
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.2
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.3
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.4
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.5
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.5.1
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.5.2
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.5.3
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.6
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.6.1
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.6.2
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.6.3
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.7
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.8
-
cpe:2.3:a:benjaminrojas:wp_editor:1.2.9