First published: Tue Sep 06 2022(Updated: )
The Download Manager plugin for WordPress is vulnerable to deserialization of untrusted input via the 'file[package_dir]' parameter in versions up to, and including 3.2.49. This makes it possible for authenticated attackers with contributor privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Download Manager | <3.2.50 | |
WordPress Download Manager | <=3.2.49 |
https://plugins.trac.wordpress.org/browser/download-manager/trunk/src/Admin/Menu/Packages.php#L68
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2436 has a medium severity rating allowing authenticated attackers to exploit the deserialization vulnerability.
CVE-2022-2436 affects the WordPress Download Manager plugin versions up to and including 3.2.49.
To fix CVE-2022-2436, update the WordPress Download Manager plugin to version 3.2.50 or higher.
CVE-2022-2436 enables authenticated attackers to execute arbitrary code via a PHAR wrapper due to untrusted input deserialization.
Exploiting CVE-2022-2436 requires authenticated user access with at least contributor privileges.