{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-2554","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","dateUpdated":"2024-08-03T00:39:08.043Z","dateReserved":"2022-07-27T00:00:00.000Z","datePublished":"2022-10-10T00:00:00.000Z"},"containers":{"cna":{"title":"Enable Media Replace < 4.0.0 - Admin+ Path Traversal","providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2022-10-10T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"The Enable Media Replace WordPress plugin before 4.0.0 does not ensure that renamed files are moved to the Upload folder, which could allow high privilege users such as admin to move them outside to the web root directory via a path traversal attack for example"}],"affected":[{"vendor":"Unknown","product":"Enable Media Replace","versions":[{"version":"4.0.0","status":"affected","lessThan":"4.0.0","versionType":"custom"}]}],"references":[{"url":"https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9"}],"credits":[{"lang":"en","value":"Raad Haddad of Cloudyrion GmbH"}],"problemTypes":[{"descriptions":[{"type":"CWE","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","cweId":"CWE-22","lang":"en"}]}],"x_generator":"WPScan CVE Generator","source":{"discovery":"EXTERNAL"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:39:08.043Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/5872f4bf-f423-4ace-b8b6-d4cc4f6ca8d9","tags":["x_transferred"]}]}]}}