VYPR
Medium severity6.2NVD Advisory· Published May 10, 2026· Updated May 12, 2026

CVE-2022-50956

CVE-2022-50956

Description

WordPress Plugin amministrazione-aperta 3.7.3 contains a local file read vulnerability that allows unauthenticated attackers to read arbitrary files by exploiting insufficient input validation in the open parameter. Attackers can supply file paths through the open GET parameter in dispatcher.php to include and read sensitive files accessible to the web server.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unauthenticated local file read vulnerability in WordPress plugin amministrazione-aperta 3.7.3 via insufficient input validation in the 'open' parameter of dispatcher.php allows reading arbitrary files.

Vulnerability

Details

The WordPress plugin amministrazione-aperta version 3.7.3 contains a local file read vulnerability due to insufficient input validation in the open GET parameter within dispatcher.php [2][3]. The vulnerable code directly includes a file path supplied by the user without proper sanitization, allowing path traversal [3].

Exploitation

An unauthenticated attacker can exploit this by sending a crafted request to wp-content/plugins/amministrazione-aperta/wpgov/dispatcher.php?open=../../../../etc/passwd or similar path traversal sequences [3]. No authentication is required, and the attack can be performed remotely over HTTP [2].

Impact

Successful exploitation allows reading arbitrary files accessible to the web server, including sensitive configuration files such as wp-config.php, which may contain database credentials and secret keys [2]. This could lead to further compromise of the WordPress installation and underlying server.

Mitigation

Users should update the plugin to a patched version if available. The plugin is developed for Italian public administration and is available on the WordPress plugin repository [1]. As of the advisory, version 3.7.3 is affected; later versions may have addressed the issue [2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.