The WP Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'current_theme_root' parameter in versions up to, and including 1.2.9. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
History

Fri, 27 Sep 2024 01:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:benjaminrojas:wp_editor:*:*:*:*:*:wordpress:*:*

Fri, 13 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Benjaminrojas
Benjaminrojas wp Editor
CPEs cpe:2.3:a:benjaminrojas:wp_editor:*:*:*:*:*:*:*:*
Vendors & Products Benjaminrojas
Benjaminrojas wp Editor
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 13 Sep 2024 15:15:00 +0000

Type Values Removed Values Added
Description The WP Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'current_theme_root' parameter in versions up to, and including 1.2.9. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
Title WP Editor <= 1.2.9 - Authenticated (Admin+) PHAR Deserialization
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-09-13T15:10:43.938Z

Updated: 2024-09-13T20:07:11.786Z

Reserved: 2022-07-15T14:33:04.354Z

Link: CVE-2022-2446

cve-icon Vulnrichment

Updated: 2024-09-13T20:07:05.572Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-13T15:15:13.577

Modified: 2024-09-27T01:09:05.217

Link: CVE-2022-2446

cve-icon Redhat

No data.