CVE-2022-3861

The Betheme theme for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 26.5.1.4 via deserialization of untrusted input supplied via the import, mfn-items-import-page, and mfn-items-import parameters passed through the mfn_builder_import, mfn_builder_import_page, importdata, importsinglepage, and importfromclipboard functions. This makes it possible for authenticated attackers, with contributor level permissions and above to inject a PHP Object. The additional presence of a POP chain would make it possible for attackers to execute code, retrieve sensitive data, delete files, etc..
Configurations

Configuration 1 (hide)

cpe:2.3:a:muffingroup:betheme:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:20

Type Values Removed Values Added
References () https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt - Exploit, Third Party Advisory () https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt - Exploit, Third Party Advisory
References () https://muffingroup.com/betheme/ - Product () https://muffingroup.com/betheme/ - Product
References () https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3861 - Third Party Advisory () https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3861 - Third Party Advisory

07 Nov 2023, 03:51

Type Values Removed Values Added
Summary The Betheme theme for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 26.5.1.4 via deserialization of untrusted input supplied via the import, mfn-items-import-page, and mfn-items-import parameters passed through the mfn_builder_import, mfn_builder_import_page, importdata, importsinglepage, and importfromclipboard functions. This makes it possible for authenticated attackers, with contributor level permissions and above to inject a PHP Object. The additional presence of a POP chain would make it possible for attackers to execute code, retrieve sensitive data, delete files, etc.. The Betheme theme for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 26.5.1.4 via deserialization of untrusted input supplied via the import, mfn-items-import-page, and mfn-items-import parameters passed through the mfn_builder_import, mfn_builder_import_page, importdata, importsinglepage, and importfromclipboard functions. This makes it possible for authenticated attackers, with contributor level permissions and above to inject a PHP Object. The additional presence of a POP chain would make it possible for attackers to execute code, retrieve sensitive data, delete files, etc..

Information

Published : 2022-11-21 13:15

Updated : 2024-11-21 07:20


NVD link : CVE-2022-3861

Mitre link : CVE-2022-3861

CVE.ORG link : CVE-2022-3861


JSON object : View

Products Affected

muffingroup

  • betheme
CWE
CWE-502

Deserialization of Untrusted Data