CVE-2023-4402
20.10.2023, 07:15
The Essential Blocks plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 4.2.0 via deserialization of untrusted input in the get_products function. This allows unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.Enginsight
| Vendor | Product | Version |
|---|---|---|
| wpdeveloper | essential_blocks | 𝑥 < 4.2.1 |
| wpdeveloper | essential_blocks_pro | 𝑥 < 1.1.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References