Vulnerability Details CVE-2022-3360
The LearnPress WordPress plugin before 4.1.7.2 unserialises user input in a REST API endpoint available to unauthenticated users, which could lead to PHP Object Injection when a suitable gadget is present, leadint to remote code execution (RCE). To successfully exploit this vulnerability attackers must have knowledge of the site secrets, allowing them to generate a valid hash via the wp_hash() function.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.117
EPSS Ranking 93.3%
CVSS Severity
CVSS v3 Score 8.1
Products affected by CVE-2022-3360
-
cpe:2.3:a:thimpress:learnpress:-
-
cpe:2.3:a:thimpress:learnpress:1.0
-
cpe:2.3:a:thimpress:learnpress:2.0.6
-
cpe:2.3:a:thimpress:learnpress:2.0.9
-
cpe:2.3:a:thimpress:learnpress:2.1.0
-
cpe:2.3:a:thimpress:learnpress:2.1.3
-
cpe:2.3:a:thimpress:learnpress:2.1.4
-
cpe:2.3:a:thimpress:learnpress:2.1.5.2
-
cpe:2.3:a:thimpress:learnpress:2.1.5.3
-
cpe:2.3:a:thimpress:learnpress:2.1.6
-
cpe:2.3:a:thimpress:learnpress:2.1.7
-
cpe:2.3:a:thimpress:learnpress:2.1.8
-
cpe:2.3:a:thimpress:learnpress:3.0.0
-
cpe:2.3:a:thimpress:learnpress:3.1.0
-
cpe:2.3:a:thimpress:learnpress:3.2.1
-
cpe:2.3:a:thimpress:learnpress:3.2.2
-
cpe:2.3:a:thimpress:learnpress:3.2.5.2
-
cpe:2.3:a:thimpress:learnpress:3.2.6.10
-
cpe:2.3:a:thimpress:learnpress:3.2.6.5
-
cpe:2.3:a:thimpress:learnpress:3.2.6.7
-
cpe:2.3:a:thimpress:learnpress:3.2.6.8
-
cpe:2.3:a:thimpress:learnpress:3.2.6.9
-
cpe:2.3:a:thimpress:learnpress:3.2.7
-
cpe:2.3:a:thimpress:learnpress:3.2.7.1
-
cpe:2.3:a:thimpress:learnpress:3.2.7.2
-
cpe:2.3:a:thimpress:learnpress:3.2.7.3
-
cpe:2.3:a:thimpress:learnpress:3.2.7.4
-
cpe:2.3:a:thimpress:learnpress:3.2.7.5
-
cpe:2.3:a:thimpress:learnpress:3.2.7.6
-
cpe:2.3:a:thimpress:learnpress:3.2.7.7
-
cpe:2.3:a:thimpress:learnpress:3.2.7.8
-
cpe:2.3:a:thimpress:learnpress:3.2.7.9
-
cpe:2.3:a:thimpress:learnpress:3.2.8
-
cpe:2.3:a:thimpress:learnpress:3.2.8.1
-
cpe:2.3:a:thimpress:learnpress:3.2.8.2
-
cpe:2.3:a:thimpress:learnpress:3.2.8.3
-
cpe:2.3:a:thimpress:learnpress:3.2.8.4
-
cpe:2.3:a:thimpress:learnpress:3.2.8.5
-
cpe:2.3:a:thimpress:learnpress:3.2.8.6
-
cpe:2.3:a:thimpress:learnpress:3.2.8.7
-
cpe:2.3:a:thimpress:learnpress:3.2.8.8
-
cpe:2.3:a:thimpress:learnpress:4.0.0
-
cpe:2.3:a:thimpress:learnpress:4.0.1
-
cpe:2.3:a:thimpress:learnpress:4.0.2
-
cpe:2.3:a:thimpress:learnpress:4.0.3
-
cpe:2.3:a:thimpress:learnpress:4.0.4
-
cpe:2.3:a:thimpress:learnpress:4.0.5
-
cpe:2.3:a:thimpress:learnpress:4.0.6
-
cpe:2.3:a:thimpress:learnpress:4.0.7
-
cpe:2.3:a:thimpress:learnpress:4.0.8
-
cpe:2.3:a:thimpress:learnpress:4.0.9
-
cpe:2.3:a:thimpress:learnpress:4.1.0
-
cpe:2.3:a:thimpress:learnpress:4.1.1
-
cpe:2.3:a:thimpress:learnpress:4.1.2
-
cpe:2.3:a:thimpress:learnpress:4.1.3
-
cpe:2.3:a:thimpress:learnpress:4.1.3.1
-
cpe:2.3:a:thimpress:learnpress:4.1.3.2
-
cpe:2.3:a:thimpress:learnpress:4.1.4
-
cpe:2.3:a:thimpress:learnpress:4.1.4.1
-
cpe:2.3:a:thimpress:learnpress:4.1.5
-
cpe:2.3:a:thimpress:learnpress:4.1.6
-
cpe:2.3:a:thimpress:learnpress:4.1.6.1
-
cpe:2.3:a:thimpress:learnpress:4.1.6.2
-
cpe:2.3:a:thimpress:learnpress:4.1.6.3
-
cpe:2.3:a:thimpress:learnpress:4.1.6.4
-
cpe:2.3:a:thimpress:learnpress:4.1.6.5
-
cpe:2.3:a:thimpress:learnpress:4.1.6.6
-
cpe:2.3:a:thimpress:learnpress:4.1.6.7
-
cpe:2.3:a:thimpress:learnpress:4.1.6.8
-
cpe:2.3:a:thimpress:learnpress:4.1.6.9
-
cpe:2.3:a:thimpress:learnpress:4.1.6.9.1
-
cpe:2.3:a:thimpress:learnpress:4.1.6.9.2
-
cpe:2.3:a:thimpress:learnpress:4.1.6.9.3
-
cpe:2.3:a:thimpress:learnpress:4.1.7
-
cpe:2.3:a:thimpress:learnpress:4.1.7.1