PHP Object Injection Vulnerability in String Locator Plugin for WordPress
CVE-2024-10936
8.8HIGH
Summary
The String Locator plugin for WordPress contains a vulnerability that allows for PHP Object Injection due to improper handling of untrusted input during deserialization in the 'recursive_unserialize_replace' function. This flaw affects all versions up to and including 2.6.6. Attackers can exploit this vulnerability without authentication, potentially leading to the execution of arbitrary code, deletion of files, or unauthorized access to sensitive information if a suitable PHP Object Payload (POP) chain exists via other themes or plugins installed on the same site. The exploitation is triggered when an administrator initiates a search and replace action.
Affected Version(s)
String locator * <= 2.6.6
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Craig Smith