The Checkout Field Editor (Checkout Manager) for WooCommerce WordPress plugin before 1.8.0 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/0c9f22e0-1d46-4957-9ba5-5cca78861136 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/0c9f22e0-1d46-4957-9ba5-5cca78861136 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/0c9f22e0-1d46-4957-9ba5-5cca78861136 - Exploit, Third Party Advisory |
07 Nov 2023, 03:51
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2022-11-28 14:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3490
Mitre link : CVE-2022-3490
CVE.ORG link : CVE-2022-3490
JSON object : View
Products Affected
themehigh
- checkout_field_editor_for_woocommerce
CWE
No CWE.