WordPress Plugin amministrazione-aperta 3.7.3 contains a local file read vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting insufficient input validation in the open parameter. Attackers can supply file paths through the open GET parameter in dispatcher.php to include and read sensitive files accessible to the web server.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 10 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amministrazione Aperta Project
Amministrazione Aperta Project amministrazione Aperta Wordpress Wordpress wordpress |
|
| Vendors & Products |
Amministrazione Aperta Project
Amministrazione Aperta Project amministrazione Aperta Wordpress Wordpress wordpress |
Sun, 10 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress Plugin amministrazione-aperta 3.7.3 contains a local file read vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting insufficient input validation in the open parameter. Attackers can supply file paths through the open GET parameter in dispatcher.php to include and read sensitive files accessible to the web server. | |
| Title | WordPress Plugin amministrazione-aperta 3.7.3 Local File Read | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-10T12:12:51.326Z
Reserved: 2026-01-11T13:34:26.332Z
Link: CVE-2022-50956
No data.
Status : Received
Published: 2026-05-10T13:16:33.180
Modified: 2026-05-10T13:16:33.180
Link: CVE-2022-50956
No data.
OpenCVE Enrichment
Updated: 2026-05-10T20:00:05Z
Weaknesses