{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-4106","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","requesterUserId":"dc9e157c-ddf1-4983-adaf-9f01d16b5e04","dateReserved":"2022-11-21T22:51:09.906Z","datePublished":"2022-12-19T13:41:50.942Z","dateUpdated":"2025-04-14T18:14:40.947Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2022-12-19T13:41:50.942Z"},"title":"Wholesale Market for WooCommerce < 1.0.7 - Unauthenticated Arbitrary File Download","problemTypes":[{"descriptions":[{"description":"CWE-552 Files or Directories Accessible to External Parties","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Wholesale Market for WooCommerce","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.0.7"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The Wholesale Market for WooCommerce WordPress plugin before 1.0.7 does not have authorisation check, as well as does not validate user input used to generate system path, allowing unauthenticated attackers to download arbitrary file from the server."}],"references":[{"url":"https://wpscan.com/vulnerability/b60a0d3d-148f-4e9b-baee-7332890804ed","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"WPScan","type":"finder"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:27:54.544Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/b60a0d3d-148f-4e9b-baee-7332890804ed","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:49:56.237276Z","id":"CVE-2022-4106","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-14T18:14:40.947Z"}}]}}