vulnerability
WordPress Plugin: export-all-urls: CVE-2022-2638: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:M/C:N/I:C/A:C) | Aug 8, 2022 | May 15, 2025 | Apr 30, 2026 |
Severity
8
CVSS
(AV:N/AC:L/Au:M/C:N/I:C/A:C)
Published
Aug 8, 2022
Added
May 15, 2025
Modified
Apr 30, 2026
Description
The Export All URLs for WordPress is vulnerable to arbitrary file deletion in versions up to, and including, 4.3 due to missing file path and type validation in the ~/extract-all-urls-settings.php file on the 'f' parameter. This makes it possible for authenticated attackers with administrative privileges to deleted arbitrary files hosted on the server.
Solution
export-all-urls-plugin-cve-2022-2638
References
- https://www.cve.org/CVERecord?id=CVE-2022-2638
- https://www.wordfence.com/threat-intel/vulnerabilities/id/2493a2f8-d4e4-4c42-b748-5632b96b085e?source=api-prod
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2022-34885
- CVE-2022-2638
- https://attackerkb.com/topics/CVE-2022-2638
- CWE-73
- CWE-610
- EUVD-EUVD-2022-34885
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.