The BuddyForms WordPress plugin, in versions prior to 2.7.8, was affected by an unauthenticated insecure deserialization issue. An unauthenticated attacker could leverage this issue to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2023-7 |
|
History
Wed, 12 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2025-03-12T14:21:39.655Z
Reserved: 2023-02-22T00:00:00.000Z
Link: CVE-2023-26326
Updated: 2024-08-02T11:46:24.451Z
Status : Modified
Published: 2023-02-23T20:15:14.243
Modified: 2024-11-21T07:51:07.900
Link: CVE-2023-26326
No data.
OpenCVE Enrichment
No data.
Weaknesses