Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-2314— VR Calendar < 2.3.2 - Unauthenticated Arbitrary Function Call

EPSS 80.79% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-2314

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
VR Calendar < 2.3.2 - Unauthenticated Arbitrary Function Call
Source: NVD (National Vulnerability Database)
Vulnerability Description
The VR Calendar WordPress plugin through 2.3.2 lets any user execute arbitrary PHP functions on the site.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
WordPress plugin VR Calendar 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin VR Calendar 2.2.2版本及之前版本存在操作系统命令注入漏洞。攻击者利用该漏洞在网站上执行任意 PHP 函数。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
UnknownVR Calendar 2.3.2 ~ 2.3.2 -

II. Public POCs for CVE-2022-2314

#POC DescriptionSource LinkShenlong Link
1WordPress VR Calendar plugin through 2.3.2 is susceptible to remote code execution. The plugin allows any user to execute arbitrary PHP functions on the site. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-2314.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-2314

登录查看更多情报信息。

Same Patch Batch · Unknown · 2022-08-15 · 10 CVEs total

CVE-2022-2116Elementor Contact Form DB < 1.8.0 - Reflected Cross-Site Scripting
CVE-2022-2152Duplicate Page and Post Plugin < 2.8 - Admin+ Stored Cross-Site Scripting
CVE-2022-2180GREYD.SUITE < 1.2.7 - Unauthenticated File Upload to RCE
CVE-2022-2354WP-DBManager < 2.80.8 - Admin+ Remote Command Execution
CVE-2022-2378Easy Student Results <= 2.2.8 - Reflected Cross-Site Scripting
CVE-2022-2379Easy Student Results <= 2.2.8 - Sensitive Information Disclosure via REST API
CVE-2022-2381E Unlocked - Student Result <= 1.0.4 - Arbitrary File Upload via CSRF
CVE-2022-2384Digital Publications by Supsystic < 1.7.4 - Admin+ Stored Cross-Site Scripting
CVE-2022-2535SearchWP Live Ajax Search < 1.6.2 - Unauthenticated Arbitrary Post Title Disclosure

IV. Related Vulnerabilities

V. Comments for CVE-2022-2314

No comments yet


Leave a comment