{"containers":{"cna":{"affected":[{"product":"Library File Manager","vendor":"Unknown","versions":[{"lessThan":"5.2.3","status":"affected","version":"5.2.3","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Luan Pedersni"}],"descriptions":[{"lang":"en","value":"The Library File Manager WordPress plugin before 5.2.3 is using an outdated version of the elFinder library, which is know to be affected by security issues (CVE-2021-32682), and does not have any authorisation as well as CSRF checks in its connector AJAX action, allowing any authenticated users, such as subscriber to call it. Furthermore, as the options passed to the elFinder library does not restrict any file type, users with a role as low as subscriber can Create/Upload/Delete Arbitrary files and folders."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-434","description":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-04-04T15:35:41.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/997a7fbf-98c6-453e-ad84-75c1e91d5a1e"}],"source":{"discovery":"EXTERNAL"},"title":"Library File Manager < 5.2.3 - Subscriber+ Arbitrary File Creation/Upload/Deletion","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2022-0403","STATE":"PUBLIC","TITLE":"Library File Manager < 5.2.3 - Subscriber+ Arbitrary File Creation/Upload/Deletion"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Library File Manager","version":{"version_data":[{"version_affected":"<","version_name":"5.2.3","version_value":"5.2.3"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Luan Pedersni"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Library File Manager WordPress plugin before 5.2.3 is using an outdated version of the elFinder library, which is know to be affected by security issues (CVE-2021-32682), and does not have any authorisation as well as CSRF checks in its connector AJAX action, allowing any authenticated users, such as subscriber to call it. Furthermore, as the options passed to the elFinder library does not restrict any file type, users with a role as low as subscriber can Create/Upload/Delete Arbitrary files and folders."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-434 Unrestricted Upload of File with Dangerous Type"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/997a7fbf-98c6-453e-ad84-75c1e91d5a1e","refsource":"MISC","url":"https://wpscan.com/vulnerability/997a7fbf-98c6-453e-ad84-75c1e91d5a1e"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:25:40.624Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/997a7fbf-98c6-453e-ad84-75c1e91d5a1e"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-0403","datePublished":"2022-04-04T15:35:41.000Z","dateReserved":"2022-01-28T00:00:00.000Z","dateUpdated":"2024-08-02T23:25:40.624Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}