⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2022-1119Path Traversal in Simple-file-list

Severity
7.5HIGHNVD
EPSS
85.8%
top 0.62%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedApr 19
Latest updateJun 24

Description

The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

Patches

🔴Vulnerability Details

3
GHSA
Cross-site Scripting in Jenkins JUnit Plugin2022-06-24
GHSA
GHSA-m665-jg8v-5m5r: The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader2022-04-20
CVEList
Simple File List <= 3.2.7 - Arbitrary File Download2022-04-19

💥Exploits & PoCs

1
Nuclei
WordPress Simple File List <3.2.8 - Local File Inclusion

📋Vendor Advisories

2
Red Hat
jenkins-plugin/junit: Stored XSS vulnerability in JUnit Plugin2022-06-23
Microsoft
Jenkins JUnit Plugin 1119.va_a_5e9068da_d7 and earlier does not escape descriptions of test results, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Up2022-06-14
CVE-2022-1119 — Path Traversal in Simple-file-list | cvebase