PHP Object Injection Vulnerability in Essential Blocks Plugin for WordPress
CVE-2023-4402
9.8CRITICAL
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 20 October 2023
Summary
The Essential Blocks plugin for WordPress is susceptible to PHP Object Injection due to deserialization of untrusted input within the get_products function. This vulnerability affects versions up to and including 4.2.0. Unauthenticated attackers can exploit this flaw to inject PHP objects, leading to potential risks when a dangerous Object-Property (POP) chain is present via other plugins or themes. Such exploitation could permit attackers to delete files, access sensitive information, or execute malicious code.
Affected Version(s)
Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates * <= 4.2.0
Essential Blocks Pro * <= 1.1.0
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Marco Wotschka