[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f-vw4HdEixcLPDdq3YknaCB5cBNjwKGZzxhkf9xOlSMc":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-0537","mappress-maps-for-wordpress-admin-file-upload-to-remote-code-execution","MapPress Maps for WordPress \u003C= 2.73.12 - Admin+ File Upload to Remote Code Execution","The MapPress Maps for WordPress plugin before 2.73.13 allows a high privileged user to bypass the DISALLOW_FILE_EDIT and DISALLOW_FILE_MODS settings and upload arbitrary files to the site through the \"ajax_save\" function. The file is written relative to the current 's stylesheet directory, and a .php file extension is added. No validation is performed on the content of the file, triggering an RCE vulnerability by uploading a web shell. Further the name parameter is not sanitized, allowing the payload to be uploaded to any directory to which the server has write access.","mappress-google-maps-for-wordpress",null,"\u003C2.73.13","2.73.13","medium",6,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:L\u002FA:L","Unrestricted Upload of File with Dangerous Type","2022-03-14 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F62ac66d8-fc10-4ec2-a567-7b95eb6f2c76?source=api-prod",680]