CVE-2024-5726
18.07.2024, 02:15
The Timeline Event History plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1 via deserialization of untrusted input 'timelines-data' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.Enginsight
| Vendor | Product | Version |
|---|---|---|
| wpdiscover | timeline_event_history | 𝑥 ≤ 3.1 |
𝑥
= Vulnerable software versions
References