⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.
CVE-2022-1119 — Path Traversal in Simple-file-list
Severity
7.5HIGHNVD
EPSS
85.8%
top 0.62%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedApr 19
Latest updateJun 24
Description
The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-m665-jg8v-5m5r: The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader↗2022-04-20
💥Exploits & PoCs
1Nuclei▶
WordPress Simple File List <3.2.8 - Local File Inclusion
📋Vendor Advisories
2Microsoft▶
Jenkins JUnit Plugin 1119.va_a_5e9068da_d7 and earlier does not escape descriptions of test results, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Up↗2022-06-14