Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
9.8CRITICAL
EPSS
60.2%
top 1.72%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 27
Latest updateJun 28

Description

The HTML2WP WordPress plugin through 1.0.0 does not have authorisation and CSRF checks when importing files, and does not validate them, as a result, unauthenticated attackers can upload arbitrary files (such as PHP) on the remote server

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5unknown/html2wp1.0.0

🔴Vulnerability Details

3
GHSA
GHSA-qvv9-757j-qvmm: The HTML2WP WordPress plugin through 12022-06-28
CVEList
HTML2WP <= 1.0.0 - Unauthenticated Arbitrary File Upload2022-06-27
VulnCheck
html2wp_project html2wp Cross-Site Request Forgery (CSRF)2022

💥Exploits & PoCs

1
Nuclei
WordPress HTML2WP <=1.0.0 - Arbitrary File Upload
CVE-2022-1574 (CRITICAL CVSS 9.8) | The HTML2WP WordPress plugin throug | cvebase.io