Attackers Can Deserialized Payload Files for Execution on WordPress Sites via 'images_array'
CVE-2022-2440

7.2HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
29 August 2024

Summary

The Theme Editor plugin for WordPress is susceptible to a deserialization vulnerability that affects versions up to and including 2.8. The vulnerability arises from improper handling of the 'images_array' parameter, which allows authenticated users with administrative privileges to perform unauthorized actions. By utilizing a PHAR wrapper, attackers can potentially deserialize arbitrary PHP objects that may lead to further exploits, assuming they can successfully upload a file containing a serialized payload. This vulnerability underscores the importance of keeping WordPress plugins updated to mitigate security risks.

Affected Version(s)

Theme Editor * <= 2.8

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Rasoul Jahanshahi
.