The wpDataTables WordPress plugin before 2.1.66 does not validate the "Serialized PHP array" input data before deserializing the data. This allows admins to deserialize arbitrary data which may lead to remote code execution if a suitable gadget chain is present on the server. This is impactful in environments where admin users should not be allowed to execute arbitrary code, such as multisite.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/1ab192d7-72ac-4f12-8a51-f28ee4db91bc | Exploit Third Party Advisory |
Configurations
History
07 Nov 2023, 04:22
Type | Values Removed | Values Added |
---|---|---|
CWE |
19 Sep 2023, 16:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:tms-outsource:wpdatatables:*:*:*:*:*:wordpress:*:* | |
First Time |
Tms-outsource wpdatatables
Tms-outsource |
|
References | (MISC) https://wpscan.com/vulnerability/1ab192d7-72ac-4f12-8a51-f28ee4db91bc - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
11 Sep 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-11 20:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-4314
Mitre link : CVE-2023-4314
CVE.ORG link : CVE-2023-4314
JSON object : View
Products Affected
tms-outsource
- wpdatatables
CWE
No CWE.