The WP Easy Post Types plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.4.4 via deserialization of untrusted input from the 'text' parameter in the 'ajax_import_content' function. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
History

Tue, 22 Oct 2024 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Newsignature
Newsignature wp Easy Post Types
CPEs cpe:2.3:a:newsignature:wp_easy_post_types:*:*:*:*:*:wordpress:*:*
Vendors & Products Newsignature
Newsignature wp Easy Post Types

Fri, 18 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Wp Easy Post Types Project
Wp Easy Post Types Project wp Easy Post Types
CPEs cpe:2.3:a:wp_easy_post_types_project:wp_easy_post_types:*:-:-:*:-:wordpress:*:*
Vendors & Products Wp Easy Post Types Project
Wp Easy Post Types Project wp Easy Post Types
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 18 Oct 2024 07:45:00 +0000

Type Values Removed Values Added
Description The WP Easy Post Types plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.4.4 via deserialization of untrusted input from the 'text' parameter in the 'ajax_import_content' function. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Title WP Easy Post Types <= 1.4.4 - Authenticated (Subscriber+) PHP Object Injection
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-18T07:35:26.337Z

Updated: 2024-10-18T13:58:16.183Z

Reserved: 2024-10-17T11:54:53.380Z

Link: CVE-2024-10079

cve-icon Vulnrichment

Updated: 2024-10-18T13:58:09.619Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-18T08:15:04.300

Modified: 2024-10-22T16:27:54.577

Link: CVE-2024-10079

cve-icon Redhat

No data.