First published: Thu Oct 21 2021(Updated: )
Version 3.3.23 of the Sassy Social Share WordPress plugin is vulnerable to PHP Object Injection via the wp_ajax_heateor_sss_import_config AJAX action due to deserialization of unvalidated user supplied inputs via the import_config function found in the ~/admin/class-sassy-social-share-admin.php file. This can be exploited by underprivileged authenticated users due to a missing capability check on the import_config function.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Heateor Sassy Social Share | =3.3.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39321 is a vulnerability in version 3.3.23 of the Sassy Social Share WordPress plugin.
CVE-2021-39321 has a severity rating of 8.8 (high).
CVE-2021-39321 allows for PHP Object Injection via the wp_ajax_heateor_sss_import_config AJAX action, due to deserialization of unvalidated user supplied inputs via the import_config function in the ~/admin/class-sassy-social-share-admin.php file.
To fix CVE-2021-39321, update Sassy Social Share plugin to a version that has patched the vulnerability, such as version 3.3.24 or later.
You can find more information about CVE-2021-39321 in the WordPress plugins.trac and Wordfence vulnerability advisories.