First published: Mon Jun 13 2022(Updated: )
Vulnerable versions of the JupiterX Core (<= 2.0.6) plugin register an AJAX action jupiterx_conditional_manager which can be used to call any function in the includes/condition/class-condition-manager.php file by sending the desired function to call in the sub_action parameter. This can be used to view site configuration and logged-in users, modify post conditions, or perform a denial of service attack.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Artbees Jupiter X Core | <=2.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1659 has been classified as a critical vulnerability due to its potential for privilege escalation.
To mitigate CVE-2022-1659, update the JupiterX Core plugin to version 2.0.7 or later.
CVE-2022-1659 affects versions of the JupiterX Core plugin up to and including 2.0.6.
CVE-2022-1659 can allow an attacker to perform unauthorized actions via AJAX actions while exploiting the vulnerable sub_action parameter.
CVE-2022-1659 is related to the includes/condition/class-condition-manager.php file within the JupiterX Core plugin.