First published: Mon Aug 08 2022(Updated: )
The Directorist WordPress plugin before 7.2.3 allows administrators to download other plugins from the same vendor directly to the site, but does not check the URL domain it gets the zip files from. This could allow administrators to run code on the server, which is a problem in multisite configurations.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
wpWax Directorist | <7.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Directorist WordPress plugin vulnerability is CVE-2022-2046.
CVE-2022-2046 has a severity rating of medium.
CVE-2022-2046 allows administrators to download other plugins from the same vendor directly to the site, but does not check the URL domain it gets the zip files from.
The affected software for CVE-2022-2046 is the Directorist WordPress plugin before version 7.2.3.
To fix the vulnerability CVE-2022-2046 in the Directorist WordPress plugin, you should update to version 7.2.3 or later.