// For flags

CVE-2022-2557

WordPress Team Members Showcase < 4.1.2 - Subscriber+ Arbitrary File Read and Deletion

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Team WordPress plugin before 4.1.2 contains a file which could allow any authenticated users to download arbitrary files from the server via a path traversal vector. Furthermore, the file will also be deleted after its content is returned to the user

El plugin Team de WordPress versiones anteriores a 4.1.2, contiene un archivo que podría permitir a cualquier usuario autenticado descargar archivos arbitrarios del servidor por medio de un vector de salto de ruta. Además, el archivo también será eliminado después de que su contenido sea devuelto al usuario

The Team - WordPress Team Member Showcase Plugin for WordPress is vulnerable to directory traversal via the 'resources/download.php' file. This allows authenticated attackers to download a copy of any file on the server, and then delete the original from the server, granted the 'wp-content/plugins/tlp-team/temp' folder exists. This folder is not currently generated by default in the free version of the plugin, but in cases where it exists it is possible for an attacker to completely take over a site by deleting wp-config.php and reinstalling WordPress, while simultaneously obtaining credentials to the existing database.

*Credits: Nhật Nam
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-07-27 CVE Reserved
  • 2022-07-29 CVE Published
  • 2024-03-14 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Radiustheme
Search vendor "Radiustheme"
Team - Wordpress Team Members Showcase
Search vendor "Radiustheme" for product "Team - Wordpress Team Members Showcase"
< 4.1.2
Search vendor "Radiustheme" for product "Team - Wordpress Team Members Showcase" and version " < 4.1.2"
wordpress
Affected