Unauthenticated attackers can exploit REST API routes and Object Injection vulnerability to compromise WordPress sites
CVE-2024-5488

Currently unrated

Key Information:

Vendor
Wordpress
Status
Vendor
CVE Published:
9 July 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

The SEOPress WordPress plugin before 7.9 does not properly protect some of its REST API routes, which combined with another Object Injection vulnerability can allow unauthenticated attackers to unserialize malicious gadget chains, compromising the site if a suitable chain is present.

Affected Version(s)

SEOPress 0 < 7.9

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Marc Montpas
WPScan
.