Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2022-4063 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: InPost Gallery < 2.1.4.1 has a Path Traversal/LFI vulnerability. <br>πŸ’₯ **Consequences**: Attackers can force inclusion of malicious files/URLs, leading to **Remote Code Execution (RCE)** on the server.…

Q2Root Cause? (CWE/Flaw)

πŸ› οΈ **Root Cause**: Insecure use of PHP's `extract()` function. <br>⚠️ **Flaw**: When rendering HTML views, user input is not sanitized before extraction, allowing variable injection.…

Q3Who is affected? (Versions/Components)

🎯 **Affected**: WordPress Plugin **InPost Gallery**. <br>πŸ“¦ **Version**: Versions **before 2.1.4.1**. <br>🌐 **Platform**: WordPress sites using this specific plugin. πŸ“… Published: 2022-12-19.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Privileges**: **Unauthenticated** access. No login needed. <br>πŸ“‚ **Data**: Can read arbitrary server files (LFI). <br>πŸ”₯ **Action**: Execute arbitrary code remotely (RCE). Full server compromise possible.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. <br>πŸ”“ **Auth**: Unauthenticated (No credentials required). <br>βš™οΈ **Config**: Exploitable via standard HTTP requests to the plugin's HTML rendering endpoints. Easy to trigger. πŸš€

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Public Exp?**: **YES**. <br>πŸ› οΈ **Tools**: <br>1. **INPGer**: Automatic mass checking tool (GitHub: im-hanzou). <br>2. **Nuclei**: Template available (projectdiscovery).…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1. Scan for InPost Gallery plugin version. <br>2. Use **Nuclei** with CVE-2022-4063 template. <br>3. Check for LFI indicators in HTTP responses. <br>4.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Fixed?**: **YES**. <br>πŸ“¦ **Patch**: Update InPost Gallery to version **2.1.4.1 or later**. <br>βœ… **Mitigation**: Official update resolves the `extract()` insecurity. πŸ”„

Q9What if no patch? (Workaround)

🚧 **No Patch?**: <br>1. **Disable/Remove** the InPost Gallery plugin immediately. <br>2. Restrict access to WordPress admin/plugins via WAF. <br>3. Monitor logs for LFI/RCE attempts. πŸ›‘ Critical workaround.

Q10Is it urgent? (Priority Suggestion)

🚨 **Urgency**: **CRITICAL**. <br>⏳ **Priority**: **P0 - Immediate Action**. <br>πŸ“’ **Reason**: Unauthenticated RCE + Public PoCs + High Impact. Patch immediately or disable plugin. ⏰ Time-sensitive.