{"uuid": "bddd1010-1497-4068-a2f3-9490a3c97966", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1659", "type": "seen", "source": "https://t.me/cibsecurity/44304", "content": "\u203c CVE-2022-1659 \u203c\n\nVulnerable versions of the JupiterX Core (&lt;= 2.0.6) plugin register an AJAX action jupiterx_conditional_manager which can be used to call any function in the includes/condition/class-condition-manager.php file by sending the desired function to call in the sub_action parameter. This can be used to view site configuration and logged-in users, modify post conditions, or perform a denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-13T18:18:10.000000Z"}