Vulnerability Details CVE-2022-4774
The Bit Form WordPress plugin before 1.9 does not validate the file types uploaded via it's file upload form field, allowing unauthenticated users to upload arbitrary files types such as PHP or HTML files to the server, leading to Remote Code Execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.053
EPSS Ranking 89.5%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2022-4774
-
cpe:2.3:a:bitapps:bit_form:-
-
cpe:2.3:a:bitapps:bit_form:1.0.0
-
cpe:2.3:a:bitapps:bit_form:1.0.1
-
cpe:2.3:a:bitapps:bit_form:1.0.10
-
cpe:2.3:a:bitapps:bit_form:1.0.2
-
cpe:2.3:a:bitapps:bit_form:1.0.3
-
cpe:2.3:a:bitapps:bit_form:1.0.4
-
cpe:2.3:a:bitapps:bit_form:1.0.5
-
cpe:2.3:a:bitapps:bit_form:1.0.6
-
cpe:2.3:a:bitapps:bit_form:1.0.7
-
cpe:2.3:a:bitapps:bit_form:1.0.8
-
cpe:2.3:a:bitapps:bit_form:1.0.9
-
cpe:2.3:a:bitapps:bit_form:1.1
-
cpe:2.3:a:bitapps:bit_form:1.1.1
-
cpe:2.3:a:bitapps:bit_form:1.1.2
-
cpe:2.3:a:bitapps:bit_form:1.1.3
-
cpe:2.3:a:bitapps:bit_form:1.1.4
-
cpe:2.3:a:bitapps:bit_form:1.1.5
-
cpe:2.3:a:bitapps:bit_form:1.1.6
-
cpe:2.3:a:bitapps:bit_form:1.1.7
-
cpe:2.3:a:bitapps:bit_form:1.1.8
-
cpe:2.3:a:bitapps:bit_form:1.2
-
cpe:2.3:a:bitapps:bit_form:1.3
-
cpe:2.3:a:bitapps:bit_form:1.3.1
-
cpe:2.3:a:bitapps:bit_form:1.3.10
-
cpe:2.3:a:bitapps:bit_form:1.3.11
-
cpe:2.3:a:bitapps:bit_form:1.3.12
-
cpe:2.3:a:bitapps:bit_form:1.3.13
-
cpe:2.3:a:bitapps:bit_form:1.3.2
-
cpe:2.3:a:bitapps:bit_form:1.3.3
-
cpe:2.3:a:bitapps:bit_form:1.3.4
-
cpe:2.3:a:bitapps:bit_form:1.3.5
-
cpe:2.3:a:bitapps:bit_form:1.3.6
-
cpe:2.3:a:bitapps:bit_form:1.3.7
-
cpe:2.3:a:bitapps:bit_form:1.3.8
-
cpe:2.3:a:bitapps:bit_form:1.4
-
cpe:2.3:a:bitapps:bit_form:1.4.1
-
cpe:2.3:a:bitapps:bit_form:1.4.10
-
cpe:2.3:a:bitapps:bit_form:1.4.11
-
cpe:2.3:a:bitapps:bit_form:1.4.12
-
cpe:2.3:a:bitapps:bit_form:1.4.12.1
-
cpe:2.3:a:bitapps:bit_form:1.4.12.2
-
cpe:2.3:a:bitapps:bit_form:1.4.13
-
cpe:2.3:a:bitapps:bit_form:1.4.13.1
-
cpe:2.3:a:bitapps:bit_form:1.4.14
-
cpe:2.3:a:bitapps:bit_form:1.4.14.1
-
cpe:2.3:a:bitapps:bit_form:1.4.14.2
-
cpe:2.3:a:bitapps:bit_form:1.4.15
-
cpe:2.3:a:bitapps:bit_form:1.4.15.1
-
cpe:2.3:a:bitapps:bit_form:1.4.16
-
cpe:2.3:a:bitapps:bit_form:1.4.16.1
-
cpe:2.3:a:bitapps:bit_form:1.4.16.2
-
cpe:2.3:a:bitapps:bit_form:1.4.17
-
cpe:2.3:a:bitapps:bit_form:1.4.18
-
cpe:2.3:a:bitapps:bit_form:1.4.19
-
cpe:2.3:a:bitapps:bit_form:1.4.2
-
cpe:2.3:a:bitapps:bit_form:1.4.20
-
cpe:2.3:a:bitapps:bit_form:1.4.21
-
cpe:2.3:a:bitapps:bit_form:1.4.21.1
-
cpe:2.3:a:bitapps:bit_form:1.4.21.2
-
cpe:2.3:a:bitapps:bit_form:1.4.21.3
-
cpe:2.3:a:bitapps:bit_form:1.4.22
-
cpe:2.3:a:bitapps:bit_form:1.4.3
-
cpe:2.3:a:bitapps:bit_form:1.4.4
-
cpe:2.3:a:bitapps:bit_form:1.4.5
-
cpe:2.3:a:bitapps:bit_form:1.4.6
-
cpe:2.3:a:bitapps:bit_form:1.4.7
-
cpe:2.3:a:bitapps:bit_form:1.4.8
-
cpe:2.3:a:bitapps:bit_form:1.4.9
-
cpe:2.3:a:bitapps:bit_form:1.5.0
-
cpe:2.3:a:bitapps:bit_form:1.5.1
-
cpe:2.3:a:bitapps:bit_form:1.5.2
-
cpe:2.3:a:bitapps:bit_form:1.6.0
-
cpe:2.3:a:bitapps:bit_form:1.6.1
-
cpe:2.3:a:bitapps:bit_form:1.6.2
-
cpe:2.3:a:bitapps:bit_form:1.7.1
-
cpe:2.3:a:bitapps:bit_form:1.7.2
-
cpe:2.3:a:bitapps:bit_form:1.7.3
-
cpe:2.3:a:bitapps:bit_form:1.8.0
-
cpe:2.3:a:bitapps:bit_form:1.8.1
-
cpe:2.3:a:bitapps:bit_form:1.8.2