
Cloud Vulnerability DB
A community-led vulnerabilities database
The Simple:Press WordPress plugin (versions up to and including 6.8) was identified with a vulnerability (CVE-2022-4031) that allows arbitrary file modifications. The vulnerability was discovered and publicly disclosed on November 29, 2022. This security issue affects WordPress installations using the Simple:Press plugin (WPScan).
The vulnerability is classified as a path traversal issue (CWE-22) where the plugin fails to properly validate files intended for updates. This could potentially allow high-privilege users, such as administrators, to modify arbitrary files beyond the plugin's intended scope. The vulnerability received a CVSS score of 3.8 (Low), indicating a relatively low severity level (WPScan).
The vulnerability enables high-privilege users to modify arbitrary files on the system, potentially leading to unauthorized file modifications beyond the plugin's intended functionality (WPScan).
The vulnerability has been fixed in Simple:Press version 6.8.1. Users are advised to update their Simple:Press plugin to this version or later to mitigate the security risk (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."