Update CVE-2022-1574.yaml
parent
43f78562f8
commit
fed01983f8
|
@ -8,13 +8,13 @@ info:
|
|||
The HTML2WP WordPress plugin through 1.0.0 does not have authorisation and CSRF checks when importing files, and does not validate them, as a result, unauthenticated attackers can upload arbitrary files (such as PHP) on the remote server.
|
||||
reference:
|
||||
- https://wpscan.com/vulnerability/c36d0ea8-bf5c-4af9-bd3d-911eb02adc14
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-1574
|
||||
- https://wordpress.org/plugins/html2wp/
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2022-1574
|
||||
classification:
|
||||
cve-id: CVE-2022-1574
|
||||
metadata:
|
||||
verified: true
|
||||
tags: cve,cve2022,wordpress,wp-plugin,wp,fileupload,wpscan,unauthenticated
|
||||
tags: cve,cve2022,wordpress,wp-plugin,wp,fileupload,unauth,html2wp
|
||||
|
||||
requests:
|
||||
- raw:
|
||||
|
|
Loading…
Reference in New Issue