CVE-2022-2438

🟡 Monitoruj

Deserializacja niezaufanego wejścia w wtyczce Broken Link Checker dla WordPressa umożliwia zdalne wykonanie kodu.

CVSS
7.2
EPSS
1.3%
Exploit
none
Vendor
managewp
Opis źródłowy (NVD)

The Broken Link Checker plugin for WordPress is vulnerable to deserialization of untrusted input via the '$log_file' value in versions up to, and including 1.11.16. This makes it possible for authenticated attackers with administrative privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.

deserialization Brak patcha
Źródła i daty
ŹródłoWartość
NVD – CVSS7.2
CISA KEV (aktywnie wykorzystywane)Nie
FIRST EPSS (prawdopodobieństwo exploita)1.3%
Opublikowano (NVD)2022-09-06 18:15:13 UTC
Ostatnia modyfikacja (NVD)2026-04-08 18:17:25 UTC
Referencje