First published: Tue Jan 21 2025(Updated: )
The String locator plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.6.6 via deserialization of untrusted input in the 'recursive_unserialize_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must perform a search and replace action to trigger the exploit.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=2.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10936 is rated as a high severity vulnerability due to its potential for unauthenticated PHP Object Injection.
To fix CVE-2024-10936, upgrade the String Locator plugin to version 2.6.7 or later.
CVE-2024-10936 affects all versions of the String Locator plugin up to and including version 2.6.6.
CVE-2024-10936 is a PHP Object Injection vulnerability caused by deserialization of untrusted input.
Yes, CVE-2024-10936 can be exploited remotely by unauthenticated attackers.