PHP Object Injection Vulnerability in Essential Blocks Plugin for WordPress
CVE-2023-4386
8.1HIGH
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 20 October 2023
Summary
The Essential Blocks plugin for WordPress is susceptible to PHP Object Injection due to insecure deserialization of untrusted input in the get_posts function. Attackers who are not authenticated can potentially inject a PHP Object, exploiting the vulnerability in versions up to and including 4.2.0. While the plugin does not inherently possess a Proof of Concept (POP) chain, the presence of such a chain through additional plugins or themes could enable attackers to carry out harmful activities, including modifying or deleting files and accessing sensitive information.
Affected Version(s)
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates * <= 4.2.0
Essential Blocks Pro * <= 1.1.0
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Marco Wotschka