{"containers":{"cna":{"affected":[{"product":"One Click Demo Import","vendor":"Unknown","versions":[{"lessThan":"3.1.0","status":"affected","version":"3.1.0","versionType":"custom"}]}],"credits":[{"lang":"en","value":"YICHENG LIU-ZTE CHENFENG lab"}],"descriptions":[{"lang":"en","value":"The One Click Demo Import WordPress plugin before 3.1.0 does not validate the imported file, allowing high privilege users such as admin to upload arbitrary files (such as PHP) even when FILE_MODS and FILE_EDIT are disallowed"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-434","description":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-04-11T14:41:07.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/0c2e2b4d-49eb-4fd9-b9f0-3feae80c1082"},{"tags":["x_refsource_CONFIRM"],"url":"https://plugins.trac.wordpress.org/changeset/2695999"}],"source":{"discovery":"EXTERNAL"},"title":"One Click Demo Import < 3.1.0 - Admin+ Arbitrary File Upload","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2022-1008","STATE":"PUBLIC","TITLE":"One Click Demo Import < 3.1.0 - Admin+ Arbitrary File Upload"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"One Click Demo Import","version":{"version_data":[{"version_affected":"<","version_name":"3.1.0","version_value":"3.1.0"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"YICHENG LIU-ZTE CHENFENG lab"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The One Click Demo Import WordPress plugin before 3.1.0 does not validate the imported file, allowing high privilege users such as admin to upload arbitrary files (such as PHP) even when FILE_MODS and FILE_EDIT are disallowed"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-434 Unrestricted Upload of File with Dangerous Type"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/0c2e2b4d-49eb-4fd9-b9f0-3feae80c1082","refsource":"MISC","url":"https://wpscan.com/vulnerability/0c2e2b4d-49eb-4fd9-b9f0-3feae80c1082"},{"name":"https://plugins.trac.wordpress.org/changeset/2695999","refsource":"CONFIRM","url":"https://plugins.trac.wordpress.org/changeset/2695999"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:47:43.121Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/0c2e2b4d-49eb-4fd9-b9f0-3feae80c1082"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset/2695999"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-1008","datePublished":"2022-04-11T14:41:07.000Z","dateReserved":"2022-03-17T00:00:00.000Z","dateUpdated":"2024-08-02T23:47:43.121Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}