
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-2184 affects the CAPTCHA 4WP WordPress plugin versions before 7.1.0. The vulnerability was discovered by ZhongFu Su(JrXnm) of WuHan University and was publicly disclosed on July 11, 2022. This security issue involves a Local File Inclusion vulnerability that can be exploited through a Cross-Site Request Forgery attack (WPScan).
The vulnerability allows user input to reach a sensitive require_once call in one of the plugin's admin-side templates. The security issue has been assigned a CVSS score of 8.0 (High) and is classified under CWE-22. The vulnerability is categorized as a Local File Inclusion (LFI) issue and falls under the OWASP Top 10 category A1: Injection (WPScan).
When successfully exploited, this vulnerability allows attackers to run arbitrary code on the server through a Cross-Site Request Forgery attack, potentially leading to complete server compromise (WPScan).
The vulnerability has been fixed in CAPTCHA 4WP version 7.1.0. Users are strongly advised to update their installations to this version or later to mitigate the security risk (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."