The UltraPress theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.1 via deserialization of untrusted input. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
History

Wed, 13 Nov 2024 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Ultrapress
Ultrapress ultrapress
CPEs cpe:2.3:a:ultrapress:ultrapress:*:*:*:*:*:wordpress:*:*
Vendors & Products Ultrapress
Ultrapress ultrapress

Tue, 01 Oct 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Ultrapressorg
Ultrapressorg ultrapress
CPEs cpe:2.3:a:ultrapressorg:ultrapress:*:*:*:*:*:*:*:*
Vendors & Products Ultrapressorg
Ultrapressorg ultrapress
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 01 Oct 2024 07:45:00 +0000

Type Values Removed Values Added
Description The UltraPress theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.1 via deserialization of untrusted input. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Title UltraPress <= 1.2.1 - Authenticated (Contributor+) PHP Object Injection
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-01T07:30:16.381Z

Updated: 2024-10-01T13:41:47.768Z

Reserved: 2024-08-02T20:22:37.366Z

Link: CVE-2024-7434

cve-icon Vulnrichment

Updated: 2024-10-01T13:41:43.559Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-01T08:15:02.943

Modified: 2024-11-13T22:05:12.367

Link: CVE-2024-7434

cve-icon Redhat

No data.