The Betheme theme for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 26.5.1.4 via deserialization of untrusted input supplied via the import, mfn-items-import-page, and mfn-items-import parameters passed through the mfn_builder_import, mfn_builder_import_page, importdata, importsinglepage, and importfromclipboard functions. This makes it possible for authenticated attackers, with contributor level permissions and above to inject a PHP Object. The additional presence of a POP chain would make it possible for attackers to execute code, retrieve sensitive data, delete files, etc..
References
Link | Resource |
---|---|
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt | Exploit Third Party Advisory |
https://muffingroup.com/betheme/ | Product |
https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3861 | Third Party Advisory |
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt | Exploit Third Party Advisory |
https://muffingroup.com/betheme/ | Product |
https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3861 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt - Exploit, Third Party Advisory | |
References | () https://muffingroup.com/betheme/ - Product | |
References | () https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3861 - Third Party Advisory |
07 Nov 2023, 03:51
Type | Values Removed | Values Added |
---|---|---|
Summary | The Betheme theme for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 26.5.1.4 via deserialization of untrusted input supplied via the import, mfn-items-import-page, and mfn-items-import parameters passed through the mfn_builder_import, mfn_builder_import_page, importdata, importsinglepage, and importfromclipboard functions. This makes it possible for authenticated attackers, with contributor level permissions and above to inject a PHP Object. The additional presence of a POP chain would make it possible for attackers to execute code, retrieve sensitive data, delete files, etc.. |
Information
Published : 2022-11-21 13:15
Updated : 2024-11-21 07:20
NVD link : CVE-2022-3861
Mitre link : CVE-2022-3861
CVE.ORG link : CVE-2022-3861
JSON object : View
Products Affected
muffingroup
- betheme
CWE
CWE-502
Deserialization of Untrusted Data