First published: Fri Oct 20 2023(Updated: )
The Essential Blocks plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 4.2.0 via deserialization of untrusted input in the get_products function. This allows unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Credit: security@wordfence.com security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
<4.2.1 | ||
<1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4402 is a vulnerability in the Essential Blocks plugin for WordPress that allows unauthenticated attackers to inject a PHP Object.
The severity of CVE-2023-4402 is critical with a CVSS score of 9.8.
CVE-2023-4402 impacts the Essential Blocks plugin by allowing unauthenticated attackers to perform PHP Object Injection via deserialization of untrusted input.
Versions of the Essential Blocks plugin up to and including 4.2.0 are affected by CVE-2023-4402.
Yes, a patch is available to fix CVE-2023-4402. It is recommended to update to version 4.2.1 of the Essential Blocks plugin.