{"containers":{"cna":{"providerMetadata":{"orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence","dateUpdated":"2026-04-08T17:35:16.664Z"},"affected":[{"vendor":"eemitch","product":"Simple File List","versions":[{"version":"0","status":"affected","lessThanOrEqual":"3.2.7","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7."}],"title":"Simple File List <= 3.2.7 - Arbitrary File Download","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/ff21241d-e488-4460-b8c2-d5a070c8c107?source=cve"},{"url":"https://plugins.trac.wordpress.org/browser/simple-file-list/trunk/includes/ee-downloader.php?rev=2071880"},{"url":"https://wpscan.com/vulnerability/075a3cc5-1970-4b64-a16f-3ec97e22b606"},{"url":"https://docs.google.com/document/d/1qIZXTzEpI4tO6832vk1KfsSAroT0FY2l--THlhJ8z3c/edit"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","cweId":"CWE-22","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH"}}],"credits":[{"lang":"en","type":"finder","value":"Bernardo Rodrigues"},{"lang":"en","type":"finder","value":"Admavidhya N"}],"timeline":[{"time":"2019-05-23T00:00:00.000Z","lang":"en","value":"Disclosed"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:55:23.871Z"},"title":"CVE Program Container","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/ff21241d-e488-4460-b8c2-d5a070c8c107?source=cve","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/browser/simple-file-list/trunk/includes/ee-downloader.php?rev=2071880","tags":["x_transferred"]},{"url":"https://wpscan.com/vulnerability/075a3cc5-1970-4b64-a16f-3ec97e22b606","tags":["x_transferred"]},{"url":"https://docs.google.com/document/d/1qIZXTzEpI4tO6832vk1KfsSAroT0FY2l--THlhJ8z3c/edit","tags":["x_transferred"]}]}]},"cveMetadata":{"assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","assignerShortName":"Wordfence","cveId":"CVE-2022-1119","datePublished":"2022-04-19T20:26:35.000Z","dateReserved":"2022-03-28T00:00:00.000Z","dateUpdated":"2026-04-08T17:35:16.664Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"}