First published: Tue Sep 06 2022(Updated: )
The String Locator plugin for WordPress is vulnerable to deserialization of untrusted input via the 'string-locator-path' parameter in versions up to, and including 2.5.0. This makes it possible for unauthenticated users to call files using a PHAR wrapper, granted they can trick a site administrator into performing an action such as clicking on a link, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
String Locator | <=2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2434 is classified as a medium severity vulnerability due to the potential for unauthorized file execution.
To fix CVE-2022-2434, update the String Locator plugin to version 2.5.1 or later.
CVE-2022-2434 affects all installations of the String Locator plugin for WordPress up to and including version 2.5.0.
CVE-2022-2434 is a deserialization of untrusted input vulnerability.
Yes, unauthenticated users can exploit CVE-2022-2434 if they can trick a site administrator into misusing the vulnerable parameter.