CVE-2023-4314

The wpDataTables WordPress plugin before 2.1.66 does not validate the "Serialized PHP array" input data before deserializing the data. This allows admins to deserialize arbitrary data which may lead to remote code execution if a suitable gadget chain is present on the server. This is impactful in environments where admin users should not be allowed to execute arbitrary code, such as multisite.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:tms-outsource:wpdatatables:*:*:*:*:*:wordpress:*:*

History

07 Nov 2023, 04:22

Type Values Removed Values Added
CWE CWE-502

19 Sep 2023, 16:17

Type Values Removed Values Added
CPE cpe:2.3:a:tms-outsource:wpdatatables:*:*:*:*:*:wordpress:*:*
First Time Tms-outsource wpdatatables
Tms-outsource
References (MISC) https://wpscan.com/vulnerability/1ab192d7-72ac-4f12-8a51-f28ee4db91bc - (MISC) https://wpscan.com/vulnerability/1ab192d7-72ac-4f12-8a51-f28ee4db91bc - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2

11 Sep 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-11 20:15

Updated : 2024-02-28 20:33


NVD link : CVE-2023-4314

Mitre link : CVE-2023-4314

CVE.ORG link : CVE-2023-4314


JSON object : View

Products Affected

tms-outsource

  • wpdatatables
CWE

No CWE.