Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-2863— WPvivid Backup < 0.9.76 - Admin+ Arbitrary File Read

EPSS 8.45% · P92
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-2863

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
WPvivid Backup < 0.9.76 - Admin+ Arbitrary File Read
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Migration, Backup, Staging WordPress plugin before 0.9.76 does not sanitise and validate a parameter before using it to read the content of a file, allowing high privilege users to read any file from the web server via a Traversal attack
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
WordPress plugin Migration, Backup, Staging 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Migration, Backup, Staging 0.9.76之前版本存在路径遍历漏洞,该漏洞源于在使用参数读取文件内容之前不会对参数进行清理和验证。攻击者利用该漏洞通过遍历攻击从web服务器读取任何文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
UnknownMigration, Backup, Staging – WPvivid 0.9.76 ~ 0.9.76 -

II. Public POCs for CVE-2022-2863

#POC DescriptionSource LinkShenlong Link
1WordPress WPvivid Backup version 0.9.76 is vulnerable to local file inclusion because the plugin does not sanitize and validate a parameter before using it to read the content of a file, allowing high privilege users to read any file from the web server.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-2863.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-2863

登录查看更多情报信息。

Same Patch Batch · Unknown · 2022-09-16 · 15 CVEs total

CVE-2022-2913Login No Captcha reCAPTCHA < 1.7 - IP Check Bypass
CVE-2022-2912Craw Data <= 1.0.0 - Server Side Request Forgery
CVE-2022-2877Titan Anti-spam & Security < 7.3.1 - Protection Bypass due to IP Spoofing
CVE-2022-2887WP Server Health Stats < 1.7.0 - Admin+ Stored Cross-Site Scripting
CVE-2022-2799Affiliates Manager < 2.9.14 - Admin+ Stored Cross-Site Scripting
CVE-2022-2798Affiliates Manager < 2.9.14 - Affiliate CSV Injection
CVE-2022-2737WP STAGING < 2.9.18 - Admin+ Stored Cross-Site Scripting
CVE-2022-2669WP Taxonomy Import <= 1.0.4 - Reflected Cross-Site Scripting
CVE-2022-2654Classima < 2.1.11 - Reflected Cross-Site Scripting
CVE-2022-2655Classified Listing Pro < 2.0.20 - Reflected Cross-Site Scripting
CVE-2022-2635Autoptimize < 3.1.1 - Admin+ Stored Cross Site Scripting
CVE-2022-2575WBW Currency Switcher for WooCommerce < 1.6.6 - Admin+ Stored XSS
CVE-2022-2351Post SMTP < 2.1.4 - Admin+ Stored Cross-Site Scripting
CVE-2022-1194Mobile Events Manager < 1.4.8 - Admin+ CSV Injection

IV. Related Vulnerabilities

V. Comments for CVE-2022-2863

No comments yet


Leave a comment