CVE-2022-0679

Public Exploit
Narnoo Distributor <= 2.5.1 - Unauthenticated LFI to Arbitrary File Read / RCE

Description

The Narnoo Distributor WordPress plugin through 2.5.1 fails to validate and sanitize the lib_path parameter before it is passed into a call to require() via the narnoo_distributor_lib_request AJAX action (available to both unauthenticated and authenticated users) which results in the disclosure of arbitrary files as the content of the file is then displayed in the response as JSON data. This could also lead to RCE with various tricks but depends on the underlying system and it's configuration.

Category

9.8
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 2.0 •
EPSS 80.86% Top 5%
Third-Party Advisory wpscan.com
Affected: Unknown Narnoo Distributor
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-0679?
CVE-2022-0679 has been scored as a critical severity vulnerability.
How to fix CVE-2022-0679?
To fix CVE-2022-0679, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2022-0679 being actively exploited in the wild?
It is possible that CVE-2022-0679 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~81% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-0679?
CVE-2022-0679 affects Unknown Narnoo Distributor.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.