Deserialization Vulnerability in Broken Link Checker Plugin for WordPress
CVE-2022-2438

7.2HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
6 September 2022

Summary

The Broken Link Checker plugin for WordPress has a vulnerability that allows authenticated attackers with administrative privileges to exploit the '$log_file' parameter, leading to the deserialization of untrusted data. This risk enables the potential execution of arbitrary PHP objects through a PHAR wrapper, contingent upon the attacker uploading a malicious file containing a serialized payload. Successful exploitation could lead to a variety of harmful actions if the appropriate conditions are in place.

Affected Version(s)

Broken Link Checker * <= 1.11.16

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Rasoul Jahanshahi
.