First published: Tue Sep 24 2024(Updated: )
The Easy Digital Downloads – Simple eCommerce for Selling Digital Files plugin for WordPress is vulnerable to deserialization of untrusted input via the 'upload[file]' parameter in versions up to, and including 3.3.3. This makes it possible for authenticated administrative users to call files using a PHAR wrapper, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Easy Digital Downloads | <3.3.4 | |
Easy Digital Downloads | <=3.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2439 has a high severity level due to the potential for remote code execution and data manipulation.
To fix CVE-2022-2439, update the Easy Digital Downloads – Simple eCommerce for Selling Digital Files plugin to version 3.3.4 or later.
Authenticated administrative users of the Easy Digital Downloads – Simple eCommerce for Selling Digital Files plugin up to version 3.3.3 are affected by CVE-2022-2439.
The impact of CVE-2022-2439 includes unauthorized access and potential exploitation through deserialization of untrusted input.
CVE-2022-2439 has been addressed in version 3.3.4 and later of the plugin, so users should ensure they are using the latest version.