WordPress Plugin amministrazione-aperta 3.7.3 contains a local file read vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting insufficient input validation in the open parameter. Attackers can supply file paths through the open GET parameter in dispatcher.php to include and read sensitive files accessible to the web server.
Metrics
Affected Vendors & Products
References
History
Sun, 10 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress Plugin amministrazione-aperta 3.7.3 contains a local file read vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting insufficient input validation in the open parameter. Attackers can supply file paths through the open GET parameter in dispatcher.php to include and read sensitive files accessible to the web server. | |
| Title | WordPress Plugin amministrazione-aperta 3.7.3 Local File Read | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-10T12:12:51.326Z
Reserved: 2026-01-11T13:34:26.332Z
Link: CVE-2022-50956
No data.
Status : Received
Published: 2026-05-10T13:16:33.180
Modified: 2026-05-10T13:16:33.180
Link: CVE-2022-50956
No data.
OpenCVE Enrichment
Updated: 2026-05-10T14:00:13Z