{"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-07-04T08:14:24.556Z"},"title":"HTML2WP <= 1.0.0 - Subscriber+ Arbitrary File Deletion","problemTypes":[{"descriptions":[{"description":"CWE-862 Missing Authorization","lang":"en","type":"CWE"}]},{"descriptions":[{"description":"CWE-352 Cross-Site Request Forgery (CSRF)","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"HTML2WP","versions":[{"status":"affected","versionType":"custom","version":"0","lessThanOrEqual":"1.0.0"}],"defaultStatus":"affected","collectionURL":"https://wordpress.org/plugins"}],"descriptions":[{"lang":"en","value":"The HTML2WP WordPress plugin through 1.0.0 does not have authorisation and CSRF checks in an AJAX action, available to any authenticated users such as subscriber, which could allow them to delete arbitrary file"}],"references":[{"url":"https://wpscan.com/vulnerability/9afd1805-d449-4551-986a-f92cb47c95c5","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"Daniel Ruf","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:10:03.642Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/9afd1805-d449-4551-986a-f92cb47c95c5","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2022-1572","datePublished":"2022-06-27T08:56:52.000Z","dateReserved":"2022-05-04T00:00:00.000Z","dateUpdated":"2024-08-03T00:10:03.642Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}