Skip to main content

CVE-2022-3076: CWE-434 Unrestricted Upload of File with Dangerous Type in Unknown CM Download Manager

High
VulnerabilityCVE-2022-3076cvecve-2022-3076cwe-434
Published: Mon Sep 26 2022 (09/26/2022, 12:35:42 UTC)
Source: CVE
Vendor/Project: Unknown
Product: CM Download Manager

Description

The CM Download Manager WordPress plugin before 2.8.6 allows high privilege users such as admin to upload arbitrary files by setting the any extension via the plugin's setting, which could be used by admins of multisite blog to upload PHP files for example.

AI-Powered Analysis

AILast updated: 07/08/2025, 09:41:07 UTC

Technical Analysis

CVE-2022-3076 is a high-severity vulnerability affecting the CM Download Manager WordPress plugin versions prior to 2.8.6. The vulnerability is categorized under CWE-434, which involves the unrestricted upload of files with dangerous types. Specifically, this flaw allows users with high privileges—such as administrators in a multisite WordPress environment—to upload arbitrary files by manipulating the plugin's settings to accept any file extension. This capability can be exploited to upload malicious PHP files or other executable scripts to the server. Since WordPress plugins typically run with the web server's privileges, successful exploitation could lead to remote code execution, full site compromise, data theft, or further lateral movement within the hosting environment. The vulnerability does not require user interaction beyond the actions of a privileged user, and the attack vector is network-based, meaning it can be exploited remotely if an attacker gains or already has admin-level access. The CVSS v3.1 score of 7.2 reflects the high impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no user interaction required. Although no known exploits in the wild have been reported, the potential damage from exploitation is significant, especially in multisite WordPress installations where a single compromised admin account could affect multiple sites. The lack of a patch link in the provided data suggests that users should verify plugin updates directly from official sources to ensure remediation.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, particularly for those relying on WordPress multisite setups for corporate blogs, intranets, or customer-facing portals. Exploitation could lead to unauthorized code execution, enabling attackers to implant backdoors, steal sensitive data, deface websites, or disrupt services. The compromise of a multisite environment could cascade, affecting multiple business units or subsidiaries simultaneously. Given the widespread use of WordPress across Europe, including in sectors such as finance, healthcare, education, and government, the potential for reputational damage, regulatory non-compliance (e.g., GDPR breaches), and operational disruption is considerable. Additionally, the ability to upload arbitrary PHP files could facilitate the deployment of ransomware or other malware, further amplifying the impact. Organizations with less mature privilege management or those that allow multiple administrators without strict controls are at higher risk. The vulnerability's exploitation could also be leveraged as a foothold for broader attacks against European supply chains or critical infrastructure if WordPress is used in those contexts.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first ensure that the CM Download Manager plugin is updated to version 2.8.6 or later, where the issue is resolved. If immediate patching is not feasible, administrators should restrict plugin settings to disallow arbitrary file extensions and enforce strict file type validation. Limiting the number of users with high privileges and implementing role-based access control can reduce the risk of exploitation. Organizations should also monitor file upload directories for suspicious files, especially PHP scripts, and employ web application firewalls (WAFs) configured to detect and block malicious uploads. Regular security audits and integrity checks of WordPress installations can help identify unauthorized changes early. Additionally, isolating WordPress instances in segmented network zones and applying the principle of least privilege to the web server process can limit the impact of a successful exploit. Backup strategies should be reviewed and tested to ensure rapid recovery in case of compromise. Finally, educating administrators about the risks of unrestricted file uploads and enforcing strong authentication mechanisms (e.g., MFA) can further reduce attack vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-09-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f48200acd01a24926223a

Added to database: 5/22/2025, 3:52:00 PM

Last enriched: 7/8/2025, 9:41:07 AM

Last updated: 8/12/2025, 12:23:23 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats