The Welcart e-Commerce WordPress plugin before 2.8.5 does not validate user input before using it to output the content of a file via an AJAX action available to any authenticated users, which could allow users with a role as low as subscriber to read arbitrary files on the server.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/436d8894-dab8-41ea-8ed0-a3338aded635 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/436d8894-dab8-41ea-8ed0-a3338aded635 | Exploit Third Party Advisory |
Configurations
History
20 Feb 2025, 18:34
Type | Values Removed | Values Added |
---|---|---|
First Time |
Welcart
Welcart welcart E-commerce |
|
CPE | cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:* |
Information
Published : 2023-01-02 22:15
Updated : 2025-04-10 19:15
NVD link : CVE-2022-4236
Mitre link : CVE-2022-4236
CVE.ORG link : CVE-2022-4236
JSON object : View
Products Affected
welcart
- welcart_e-commerce
CWE
CWE-552
Files or Directories Accessible to External Parties