{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-7262","assignerOrgId":"4a9b9929-2450-4021-b7b9-469a0255b215","state":"PUBLISHED","assignerShortName":"ESET","dateReserved":"2024-07-30T07:50:53.765Z","datePublished":"2024-08-15T14:24:44.511Z","dateUpdated":"2025-10-21T22:55:47.179Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://www.wps.com/","defaultStatus":"unknown","platforms":["Windows"],"product":"WPS Office","vendor":"Kingsoft","versions":[{"lessThan":"12.2.0.16412","status":"affected","version":"12.2.0.13110","versionType":"custom"}]}],"credits":[{"lang":"en","type":"analyst","value":"Romain DUMONT (ESET)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div>Improper path validation in <b>promecefpluginhost.exe</b> in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library.<br>The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document<br></div>"}],"value":"Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library.\nThe vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document"}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Exploit found in-the-wild.<br>"}],"value":"Exploit found in-the-wild."}],"impacts":[{"capecId":"CAPEC-17","descriptions":[{"lang":"en","value":"CAPEC-17: Using Malicious Files"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NO","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":9.3,"baseSeverity":"CRITICAL","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:N/RE:L","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"LOW"},"format":"CVSS","scenarios":[{"lang":"en","value":"A user clicking on a crafted hyperlink could lead to arbitrary code execution"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4a9b9929-2450-4021-b7b9-469a0255b215","shortName":"ESET","dateUpdated":"2024-08-22T05:51:23.952Z"},"references":[{"url":"https://www.wps.com/whatsnew/pc/20240422/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Update to latest version<br>"}],"value":"Update to latest version"}],"source":{"discovery":"EXTERNAL"},"tags":["x_known-exploited-vulnerability"],"title":"Arbitrary Code Execution in WPS Office","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-7262","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-08-31T03:55:30.362677Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2024-09-03","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-7262"}}}],"affected":[{"cpes":["cpe:2.3:a:kingsoft:wps_office:*:*:*:*:*:*:*:*"],"vendor":"kingsoft","product":"wps_office","versions":[{"status":"affected","version":"12.2.0.13110","lessThan":"12.2.0.13489","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-7262","tags":["government-resource"]}],"timeline":[{"time":"2024-09-03T00:00:00.000Z","lang":"en","value":"CVE-2024-7262 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T22:55:47.179Z"}}]}}