{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-4108","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","requesterUserId":"dc9e157c-ddf1-4983-adaf-9f01d16b5e04","dateReserved":"2022-11-21T22:51:52.571Z","datePublished":"2022-12-19T13:41:44.715Z","dateUpdated":"2025-04-14T18:13:40.570Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2022-12-19T13:41:44.715Z"},"title":"Wholesale Market for WooCommerce < 1.0.8 - Admin+ Arbitrary File Download","problemTypes":[{"descriptions":[{"description":"CWE-552 Files or Directories Accessible to External Parties","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Wholesale Market for WooCommerce","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"1.0.8"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The Wholesale Market for WooCommerce WordPress plugin before 1.0.8 does not validate user input used to generate system path, allowing high privilege users such as admin to download arbitrary file from the server even when they should not be able to (for example in multisite)"}],"references":[{"url":"https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"WPScan","type":"finder"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:27:54.475Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/9d1770df-91f0-41e3-af0d-522ae4e62470","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":4.9,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"HIGH","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:45:48.192252Z","id":"CVE-2022-4108","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-14T18:13:40.570Z"}}]}}