The NinjaFirewall plugin for WordPress is vulnerable to Authenticated PHAR Deserialization in versions up to, and including, 4.3.3. This allows authenticated attackers to perform phar deserialization on the server. This deserialization can allow other plugin or theme exploits if vulnerable software is present (WordPress, and NinjaFirewall).
References
Configurations
History
30 Oct 2024, 17:44
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
CPE | cpe:2.3:a:nintechnet:ninjafirewall:*:*:*:*:*:wordpress:*:* | |
References | () https://blog.nintechnet.com/security-issue-fixed-in-ninjafirewall-wp-edition/ - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/1a1fc6c9-50cd-40fd-a777-9eed98aab797?source=cve - Third Party Advisory | |
First Time |
Nintechnet
Nintechnet ninjafirewall |
16 Oct 2024, 16:38
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
16 Oct 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-16 07:15
Updated : 2024-10-30 17:44
NVD link : CVE-2021-4451
Mitre link : CVE-2021-4451
CVE.ORG link : CVE-2021-4451
JSON object : View
Products Affected
nintechnet
- ninjafirewall
CWE
CWE-502
Deserialization of Untrusted Data