ConvertPlus Plugin Vulnerable to PHP Object Injection
CVE-2024-4838

8.8HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
16 May 2024

Summary

The ConvertPlus plugin for WordPress is susceptible to a PHP Object Injection vulnerability due to the insecure deserialization of untrusted input from the 'settings_encoded' attribute within the 'smile_modal' shortcode. This flaw affects all versions up to and including 3.5.26 and can be exploited by authenticated attackers, possessing contributor-level access or higher. Exploitation could potentially lead to the injection of a PHP Object. While the vulnerable plugin does not inherently include a PHP Object Pollution (POP) chain, the presence of such a chain via other plugins or themes on the target site could enable an attacker to perform high-impact actions such as deleting arbitrary files, extracting sensitive data, or executing malicious code.

Affected Version(s)

ConvertPlus * <= 3.5.26

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

haidv35
.