First published: Fri Jan 01 2021(Updated: )
Insecure Deserialization in the Newsletter plugin before 6.8.2 for WordPress allows authenticated remote attackers with minimal privileges (such as subscribers) to use the tpnc_render AJAX action to inject arbitrary PHP objects via the options[inline_edits] parameter. NOTE: exploitability depends on PHP objects that might be present with certain other plugins or themes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tribulant Newsletter | <6.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35932 is a vulnerability in the Newsletter plugin before version 6.8.2 for WordPress that allows authenticated remote attackers to inject arbitrary PHP objects.
CVE-2020-35932 has a severity score of 8.8 (high).
The Newsletter plugin before version 6.8.2 for WordPress is affected by CVE-2020-35932.
Authenticated remote attackers with minimal privileges, such as subscribers, can exploit CVE-2020-35932 by using the tpnc_render AJAX action to inject arbitrary PHP objects via the options[inline_edits] parameter.
Yes, updating to version 6.8.2 of the Newsletter plugin for WordPress will fix CVE-2020-35932.