AdSanity WP Plugin v1.8.1: ajax_upload Arbitrary File Upload (RCE)
CVE-2022-4949 Published on June 7, 2023
AdSanity < 1.8.2 - Authenticated Arbitrary File Upload
The AdSanity plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'ajax_upload' function in versions up to, and including, 1.8.1. This makes it possible for authenticated attackers with Contributor+ level privileges to upload arbitrary files on the affected sites server which makes remote code execution possible.
Timeline
Disclosed
Weakness Type
What is an Unrestricted File Upload Vulnerability?
The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
CVE-2022-4949 has been classified to as an Unrestricted File Upload vulnerability or weakness.
Products Associated with CVE-2022-4949
stack.watch emails you whenever new vulnerabilities are published in Adsanityplugin Adsanity or Citrix Xen Xen. Just hit a watch button to start following.
Affected Versions
https://adsanityplugin.com/ AdSanity:- Before 1.8.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.