First published: Mon Aug 29 2022(Updated: )
The Mailchimp for WooCommerce WordPress plugin before 2.7.2 has an AJAX action that allows high privilege users to perform a POST request on behalf of the server to the internal network/LAN, the body of the request is also appended to the response so it can be used to scan private network for example
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mailchimp for WooCommerce | <2.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2556 is classified as a high-severity vulnerability due to the potential for unauthorized access to internal network resources.
To fix CVE-2022-2556, update the Mailchimp for WooCommerce plugin to version 2.7.2 or later.
CVE-2022-2556 affects users of the Mailchimp for WooCommerce WordPress plugin prior to version 2.7.2.
CVE-2022-2556 allows high privilege users to potentially make unauthorized POST requests to internal network resources.
Yes, CVE-2022-2556 can be exploited remotely by manipulating AJAX actions through the affected plugin.