Vulnerability Details : CVE-2022-3966
A vulnerability, which was classified as critical, has been found in Ultimate Member Plugin up to 2.5.0. This issue affects the function load_template of the file includes/core/class-shortcodes.php of the component Template Handler. The manipulation of the argument tpl leads to pathname traversal. The attack may be initiated remotely. Upgrading to version 2.5.1 is able to address this issue. The name of the patch is e1bc94c1100f02a129721ba4be5fbc44c3d78ec4. It is recommended to upgrade the affected component. The identifier VDB-213545 was assigned to this vulnerability.
Vulnerability category: Directory traversal
Products affected by CVE-2022-3966
- cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-3966
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-3966
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
2.8
|
1.4
|
VulDB | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2022-3966
-
Assigned by: cna@vuldb.com (Primary)
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: cna@vuldb.com (Primary)
References for CVE-2022-3966
-
https://github.com/ultimatemember/ultimatemember/releases/tag/2.5.1
Release Ultimate Member 2.5.1 · ultimatemember/ultimatemember · GitHubRelease Notes;Third Party Advisory
-
https://github.com/ultimatemember/ultimatemember/commit/e1bc94c1100f02a129721ba4be5fbc44c3d78ec4
- fixed Directory Traversal vulnerability. Using realpath for that; · ultimatemember/ultimatemember@e1bc94c · GitHubPatch;Third Party Advisory
-
https://vuldb.com/?id.213545
CVE-2022-3966 | Ultimate Member Plugin Template class-shortcodes.php load_template pathname traversalThird Party Advisory
Jump to