Attackers Can Deserialized Payload Files for Execution on WordPress Sites via 'images_array'
CVE-2022-2440
7.2HIGH
Summary
The Theme Editor plugin for WordPress is susceptible to a deserialization vulnerability that affects versions up to and including 2.8. The vulnerability arises from improper handling of the 'images_array' parameter, which allows authenticated users with administrative privileges to perform unauthorized actions. By utilizing a PHAR wrapper, attackers can potentially deserialize arbitrary PHP objects that may lead to further exploits, assuming they can successfully upload a file containing a serialized payload. This vulnerability underscores the importance of keeping WordPress plugins updated to mitigate security risks.
Affected Version(s)
Theme Editor * <= 2.8
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Rasoul Jahanshahi