{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T21:48:30.650","vulnerabilities":[{"cve":{"id":"CVE-2020-22249","sourceIdentifier":"cve@mitre.org","published":"2021-07-06T20:15:07.953","lastModified":"2024-11-21T05:13:12.780","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote Code Execution vulnerability in phplist 3.5.1. The application does not check any file extensions stored in the plugin zip file, Uploading a malicious plugin which contains the php files with extensions like PHP,phtml,php7 will be copied to the plugins directory which would lead to the remote code execution"},{"lang":"es","value":"Una vulnerabilidad de ejecución de código remota en phplist versión 3.5.1. La aplicación no comprueba las extensiones de archivo almacenadas en el archivo zip del plugin, la carga de un plugin malicioso que contenga archivos php con extensiones como PHP, phtml, php7 serán copiadas en el directorio de plugins lo que conllevaría a una ejecución de código remota"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:phplist:phplist:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"A324C775-E1C4-4549-B001-2CED53CAC54F"}]}]}],"references":[{"url":"https://drive.google.com/open?id=1znDU4fDKA_seg16mJLLtgaaFfvmf-mS6","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://drive.google.com/open?id=1znDU4fDKA_seg16mJLLtgaaFfvmf-mS6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}