{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-3490","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","requesterUserId":"dc9e157c-ddf1-4983-adaf-9f01d16b5e04","dateReserved":"2022-10-13T13:33:29.751Z","datePublished":"2022-11-28T13:47:16.015Z","dateUpdated":"2025-04-25T15:13:40.572Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2022-11-28T13:47:16.015Z"},"title":"Checkout Field Editor for WooCommerce < 1.8.0 - Admin+ PHP Object Injection","problemTypes":[{"descriptions":[{"description":"CWE-502 Deserialization of Untrusted Data","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Checkout Field Editor (Checkout Manager) for WooCommerce","collectionURL":"https://wordpress.org/plugins","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.8.0"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The Checkout Field Editor (Checkout Manager) for WooCommerce WordPress plugin before 1.8.0 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present"}],"references":[{"url":"https://wpscan.com/vulnerability/0c9f22e0-1d46-4957-9ba5-5cca78861136","tags":["exploit","technical-description"]}],"credits":[{"lang":"en","value":"Nguyen Duy Quoc Khanh","type":"finder"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:14:01.484Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/0c9f22e0-1d46-4957-9ba5-5cca78861136","tags":["exploit","technical-description","x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.2,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"HIGH","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-25T15:13:08.774883Z","id":"CVE-2022-3490","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-25T15:13:40.572Z"}}]}}