CVE-2022-1386

CRITICAL EXPLOITED NUCLEI

Fusion Builder < 3.6.2 - SSRF

Title source: rule

Description

The Fusion Builder WordPress plugin before 3.6.2, used in the Avada theme, does not validate a parameter in its forms which could be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. This could be used to interact with hosts on the server's local network bypassing firewalls and access control measures.

Exploits (7)

nomisec WORKING POC 9 stars
by ardzz · infoleak
https://github.com/ardzz/CVE-2022-1386
nomisec WORKING POC 6 stars
by im-hanzou · remote
https://github.com/im-hanzou/fubucker
nomisec SCANNER 1 stars
by zycoder0day · infoleak
https://github.com/zycoder0day/CVE-2022-1386-Mass_Vulnerability
nomisec WORKING POC
by fayassgit · infoleak
https://github.com/fayassgit/CVE-2022-1386-FusionBuilder-SSRF
nomisec WORKING POC
by kreeksec · poc
https://github.com/kreeksec/CVE-2022-1386
nomisec WORKING POC
by satyasai1460 · infoleak
https://github.com/satyasai1460/CVE-2022-1386
vulncheck_xdb WORKING POC
infoleak
https://github.com/lamcodeofpwnosec/CVE-2022-1386

Nuclei Templates (1)

WordPress Fusion Builder <3.6.2 - Server-Side Request Forgery
CRITICALby akincibor,MantisSTS,calumjelrick

Scores

CVSS v3 9.8
EPSS 0.9361
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2024-01-02
CWE
CWE-918
Status published
Products (2)
fusion_builder_project/fusion_builder < 3.6.2
theme-fusion/avada < 7.6.2
Published May 16, 2022
Tracked Since Feb 18, 2026