The bt_bb_get_grid AJAX action of the Bold Page Builder WordPress plugin before 3.1.6 passes user input into the unserialize() function without any validation or sanitisation, which could lead to a PHP Object Injection. Even though the plugin did not contain a suitable gadget to fully exploit the issue, other installed plugins on the blog could allow such issue to be exploited and lead to RCE in some cases.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/08edce3f-2746-4886-8439-76e44ec76fa8 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/08edce3f-2746-4886-8439-76e44ec76fa8 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/08edce3f-2746-4886-8439-76e44ec76fa8 - Exploit, Third Party Advisory |
Information
Published : 2021-08-30 15:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24579
Mitre link : CVE-2021-24579
CVE.ORG link : CVE-2021-24579
JSON object : View
Products Affected
bold-themes
- bold_page_builder
CWE
CWE-502
Deserialization of Untrusted Data