9.8

CVE-2023-26326

Exploit

BuddyForms <= 2.7.7 - PHAR Deserialization

The BuddyForms WordPress plugin, in versions prior to 2.7.8, was affected by an unauthenticated insecure deserialization issue. An unauthenticated attacker could leverage this issue to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present.
Mögliche Gegenmaßnahme
Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC): Update to version 2.7.8, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC)
Version *-2.7.7
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ThemekraftBuddyforms SwPlatformwordpress Version < 2.7.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 41.83% 0.973
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-502 Deserialization of Untrusted Data

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.