The Ultimate Reviews plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 2.1.32 via deserialization of untrusted input in several vulnerable functions. This allows unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin.
References
Configurations
History
13 Jun 2023, 13:56
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-502 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Etoilewebdesign ultimate Reviews
Etoilewebdesign |
|
CPE | cpe:2.3:a:etoilewebdesign:ultimate_reviews:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://blog.nintechnet.com/wordpress-ultimate-reviews-plugin-fixed-insecure-deserialization-vulnerability/ - Exploit | |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/db30acd7-ce51-45d9-8ff0-6ceea8237a8c?source=cve - Third Party Advisory | |
References | (MISC) https://plugins.trac.wordpress.org/changeset/2409141 - Release Notes |
07 Jun 2023, 02:44
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-07 02:15
Updated : 2024-02-28 20:13
NVD link : CVE-2020-36726
Mitre link : CVE-2020-36726
CVE.ORG link : CVE-2020-36726
JSON object : View
Products Affected
etoilewebdesign
- ultimate_reviews
CWE
CWE-502
Deserialization of Untrusted Data