Show plain JSON{"containers": {"cna": {"affected": [{"product": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "vendor": "Unknown", "versions": [{"lessThan": "3.6.13", "status": "affected", "version": "3.6.13", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Alessio Santoru"}], "descriptions": [{"lang": "en", "value": "The Ninja Forms Contact Form WordPress plugin before 3.6.13 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog."}], "problemTypes": [{"descriptions": [{"cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-09-26T12:35:34.000Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864"}], "source": {"discovery": "EXTERNAL"}, "title": "NinjaForms < 3.6.13 - Admin+ PHP Objection Injection", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-2903", "STATE": "PUBLIC", "TITLE": "NinjaForms < 3.6.13 - Admin+ PHP Objection Injection"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Ninja Forms Contact Form \u2013 The Drag and Drop Form Builder for WordPress", "version": {"version_data": [{"version_affected": "<", "version_name": "3.6.13", "version_value": "3.6.13"}]}}]}, "vendor_name": "Unknown"}]}}, "credit": [{"lang": "eng", "value": "Alessio Santoru"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "The Ninja Forms Contact Form WordPress plugin before 3.6.13 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog."}]}, "generator": "WPScan CVE Generator", "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-502 Deserialization of Untrusted Data"}]}]}, "references": {"reference_data": [{"name": "https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864"}]}, "source": {"discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T00:53:00.439Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://wpscan.com/vulnerability/255b98ba-5da9-4424-a7e9-c438d8905864"}]}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2025-05-21T19:17:11.237210Z", "id": "CVE-2022-2903", "options": [{"Exploitation": "poc"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-05-21T19:18:35.069Z"}}]}, "cveMetadata": {"assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-2903", "datePublished": "2022-09-26T12:35:34.000Z", "dateReserved": "2022-08-19T00:00:00.000Z", "dateUpdated": "2025-05-21T19:18:35.069Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}