First published: Fri Oct 20 2023(Updated: )
The Essential Blocks plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 4.2.0 via deserialization of untrusted input in the get_posts function. This allows unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4386 is a vulnerability in the Essential Blocks plugin for WordPress that allows unauthenticated attackers to inject a PHP Object through deserialization of untrusted input in the get_posts function.
CVE-2023-4386 has a severity rating of 8.1, which is considered high.
CVE-2023-4386 affects versions up to and including 4.2.0 of the Essential Blocks plugin for WordPress.
An attacker can exploit CVE-2023-4386 by sending untrusted input to the get_posts function, leading to PHP Object Injection.
Yes, please refer to the official references for the patch and update instructions.