The Theme Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'images_array' parameter in versions up to, and including 2.8. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
Metrics
Affected Vendors & Products
References
History
Thu, 29 Aug 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mndpsingh287
Mndpsingh287 theme Editor |
|
CPEs | cpe:2.3:a:mndpsingh287:theme_editor:*:*:*:*:*:*:*:* | |
Vendors & Products |
Mndpsingh287
Mndpsingh287 theme Editor |
|
Metrics |
ssvc
|
Thu, 29 Aug 2024 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Theme Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'images_array' parameter in versions up to, and including 2.8. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload. | |
Title | Theme Editor <= 2.8 - Authenticated (Admin+) PHAR Deserialization | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-08-29T03:30:46.255Z
Updated: 2024-08-29T14:01:39.603Z
Reserved: 2022-07-15T14:24:17.655Z
Link: CVE-2022-2440
Vulnrichment
Updated: 2024-08-29T14:01:33.991Z
NVD
Status : Awaiting Analysis
Published: 2024-08-29T11:15:23.790
Modified: 2024-08-29T13:25:27.537
Link: CVE-2022-2440
Redhat
No data.