The Easy Digital Downloads – Simple eCommerce for Selling Digital Files plugin for WordPress is vulnerable to deserialization of untrusted input via the 'upload[file]' parameter in versions up to, and including 3.3.3. This makes it possible for authenticated administrative users to call files using a PHAR wrapper, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present.
Metrics
Affected Vendors & Products
References
History
Fri, 07 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Awesomemotive
Awesomemotive easy Digital Downloads |
|
CPEs | cpe:2.3:a:awesomemotive:easy_digital_downloads:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Awesomemotive
Awesomemotive easy Digital Downloads |
Tue, 24 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Easydigitaldownloads
Easydigitaldownloads easy Digital Downloads |
|
CPEs | cpe:2.3:a:easydigitaldownloads:easy_digital_downloads:*:*:*:*:*:*:*:* | |
Vendors & Products |
Easydigitaldownloads
Easydigitaldownloads easy Digital Downloads |
|
Metrics |
ssvc
|
Tue, 24 Sep 2024 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Easy Digital Downloads – Simple eCommerce for Selling Digital Files plugin for WordPress is vulnerable to deserialization of untrusted input via the 'upload[file]' parameter in versions up to, and including 3.3.3. This makes it possible for authenticated administrative users to call files using a PHAR wrapper, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. | |
Title | Easy Digital Downloads – Simple eCommerce for Selling Digital Files <= 3.3.3 - Authenticated (Admin+) PHAR Deserialization | |
Weaknesses | CWE-502 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-09-24T15:30:14.881Z
Reserved: 2022-07-15T14:24:11.668Z
Link: CVE-2022-2439

Updated: 2024-09-24T15:30:08.774Z

Status : Analyzed
Published: 2024-09-24T03:15:02.040
Modified: 2025-02-07T17:08:10.297
Link: CVE-2022-2439

No data.