First published: Mon Jun 13 2022(Updated: )
Vulnerable versions of the Jupiter (<= 6.10.1) and JupiterX (<= 2.0.6) Themes allow logged-in users, including subscriber-level users, to perform Path Traversal and Local File inclusion. In the JupiterX theme, the jupiterx_cp_load_pane_action AJAX action present in the lib/admin/control-panel/control-panel.php file calls the load_control_panel_pane function. It is possible to use this action to include any local PHP file via the slug parameter. The Jupiter theme has a nearly identical vulnerability which can be exploited via the mka_cp_load_pane_action AJAX action present in the framework/admin/control-panel/logic/functions.php file, which calls the mka_cp_load_pane_action function.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Artbees Jupiter X Core | <=6.10.1 | |
Artbees Jupiter X Core | <=2.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1657 is a critical vulnerability affecting Jupiter and JupiterX themes, enabling unauthorized access and file manipulation.
To mitigate CVE-2022-1657, update the Jupiter theme to version 6.10.2 or later and the JupiterX theme to version 2.0.7 or later.
CVE-2022-1657 can enable path traversal and local file inclusion attacks, allowing attackers to access sensitive files on the server.
Logged-in users, including those with subscriber-level permissions, are affected by CVE-2022-1657 in vulnerable versions of the Jupiter and JupiterX themes.
Jupiter versions up to and including 6.10.1 are vulnerable to CVE-2022-1657.