9.8
CVE-2021-24857
- EPSS 0.8%
- Veröffentlicht 13.12.2021 11:15:09
- Zuletzt bearbeitet 21.11.2024 05:53:53
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
ToTop Link <= 1.7.1 - Unauthenticated PHP Object Injection
The ToTop Link WordPress plugin through 1.7.1 passes base64 encoded user input to the unserialize() PHP function, which could lead to PHP Object injection if a plugin installed on the blog has a suitable gadget chain.
Mögliche Gegenmaßnahme
ToTop Link: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
ToTop Link
Version
*-1.7.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nocean ≫ Totop Link SwPlatformwordpress Version <= 1.7.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.8% | 0.73 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.