[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fUVXONYlJUq_q8VH8aQrOq3K1XeGGUlAOt3wp7VODJ1E":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-2445","ultimate-member-user-profile-user-registration-login-membership-plugin-authenticated-admin-directory-traversal","Ultimate Member – User Profile, User Registration, Login & Membership Plugin \u003C= 2.5.0 - Authenticated (Admin+) Directory Traversal","The Ultimate Member plugin for WordPress is vulnerable to directory traversal in versions up to, and including 2.5.0 due to insufficient input validation on the 'pack' parameter. This makes it possible for attackers with administrative privileges to supply arbitrary paths using traversal (..\u002F..\u002F) to access and include files outside of the intended directory. If an attacker can successfully upload a file with the exact name 'init.php' then remote code execution may also be possible.","ultimate-member",null,">=1.0 \u003C=2.5.0","2.5.1","medium",4.7,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:L\u002FI:L\u002FA:L","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2022-10-28 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F04cd8da4-9da3-4c80-a77e-c2f792391593?source=api-prod",452]