CVE-2024-7262 is a vulnerability in Kingsoft Wps Office
Published on August 15, 2024
Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library. The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document
Known Exploited Vulnerability
This Kingsoft WPS Office Path Traversal Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Kingsoft WPS Office contains a path traversal vulnerability in promecefpluginhost.exe on Windows that allows an attacker to load an arbitrary Windows library.
The following remediation steps are recommended / required by September 24, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2024-7262 is exploitable with local system access, requires user interaction. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 1.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.
What is a Directory traversal Vulnerability?
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CVE-2024-7262 has been classified to as a Directory traversal vulnerability or weakness.
Products Associated with CVE-2024-7262
You can be notified by stack.watch whenever vulnerabilities like CVE-2024-7262 are published in these products:
What versions of Wps Office are vulnerable to CVE-2024-7262?
Each of the following must match for the vulnerability to exist.