{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-4109","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","dateReserved":"2022-11-21T22:52:26.396Z","datePublished":"2023-01-02T21:49:31.099Z","dateUpdated":"2025-04-10T18:45:55.816Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-01-10T09:08:51.783Z"},"title":"Wholesale Market for WooCommerce < 2.0.0 - Admin+ Arbitrary Log Download","problemTypes":[{"descriptions":[{"description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Wholesale Market for WooCommerce","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"2.0.0"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The Wholesale Market for WooCommerce WordPress plugin before 2.0.0 does not validate user input against path traversal attacks, allowing high privilege users such as admin to download arbitrary logs from the server even when they should not be able to (for example in multisite)"}],"references":[{"url":"https://wpscan.com/vulnerability/51e023de-189d-4557-9655-23f7ba58b670","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"WPScan","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:27:54.413Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/51e023de-189d-4557-9655-23f7ba58b670","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":2.7,"attackVector":"NETWORK","baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"HIGH","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-10T18:45:23.267412Z","id":"CVE-2022-4109","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-10T18:45:55.816Z"}}]}}