Unauthenticated attackers can exploit REST API routes and Object Injection vulnerability to compromise WordPress sites
CVE-2024-5488
Currently unrated
Key Information:
Badges
πΎ Exploit Existsπ‘ Public PoC
Summary
The SEOPress WordPress plugin before 7.9 does not properly protect some of its REST API routes, which combined with another Object Injection vulnerability can allow unauthenticated attackers to unserialize malicious gadget chains, compromising the site if a suitable chain is present.
Affected Version(s)
SEOPress 0 < 7.9
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Marc Montpas
WPScan