8.8
CVE-2021-24579
- EPSS 0.78%
- Veröffentlicht 30.08.2021 15:15:07
- Zuletzt bearbeitet 21.11.2024 05:53:20
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
Bold Page Builder <= 3.1.5 - PHP Object Injection
The bt_bb_get_grid AJAX action of the Bold Page Builder WordPress plugin before 3.1.6 passes user input into the unserialize() function without any validation or sanitisation, which could lead to a PHP Object Injection. Even though the plugin did not contain a suitable gadget to fully exploit the issue, other installed plugins on the blog could allow such issue to be exploited and lead to RCE in some cases.
Mögliche Gegenmaßnahme
Bold Page Builder: Update to version 3.1.6, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Bold Page Builder
Version
*-3.1.5
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Bold-themes ≫ Bold Page Builder SwPlatformwordpress Version < 3.1.6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.78% | 0.713 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.5 | 8 | 6.4 |
AV:N/AC:L/Au:S/C:P/I:P/A:P
|
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.