Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2022-4140

Severity
7.5HIGH
EPSS
53.1%
top 2.04%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 2
Latest updateJan 3

Description

The Welcart e-Commerce WordPress plugin before 2.8.5 does not validate user input before using it to output the content of a file, which could allow unauthenticated attacker to read arbitrary files on the server

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-6c75-m6fq-9mh7: The Welcart e-Commerce WordPress plugin before 22023-01-03
CVEList
Welcart e-Commerce < 2.8.5 - Unauthenticated Arbitrary File Access2023-01-02

💥Exploits & PoCs

1
Nuclei
WordPress Welcart e-Commerce <2.8.5 - Arbitrary File Access

📋Vendor Advisories

3
Mozilla
Mozilla Foundation Security Advisory 2022-02: CVE-2021-4140
Mozilla
Mozilla Foundation Security Advisory 2022-01: CVE-2021-4140
Mozilla
Mozilla Foundation Security Advisory 2022-03: CVE-2021-4140
CVE-2022-4140 (HIGH CVSS 7.5) | The Welcart e-Commerce WordPress pl | cvebase.io