Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 09 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Skatox
Skatox js Archive List Wordpress Wordpress wordpress |
|
| Vendors & Products |
Skatox
Skatox js Archive List Wordpress Wordpress wordpress |
Sat, 07 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.1.7 via the 'included' shortcode attribute. This is due to the deserialization of untrusted input supplied via the 'included' parameter of the plugin's shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | |
| Title | JS Archive List <= 6.1.7 - Authenticated (Contributor+) PHP Object Injection via 'included' Shortcode Attribute | |
| Weaknesses | CWE-502 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-03-09T19:33:46.647Z
Reserved: 2026-02-05T20:04:06.842Z
Link: CVE-2026-2020
Updated: 2026-03-09T19:07:39.753Z
Status : Awaiting Analysis
Published: 2026-03-07T02:16:12.077
Modified: 2026-03-09T13:35:34.633
Link: CVE-2026-2020
No data.
OpenCVE Enrichment
Updated: 2026-03-09T10:06:06Z