The Betheme theme for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 26.5.1.4 via deserialization of untrusted input supplied via the import, mfn-items-import-page, and mfn-items-import parameters passed through the mfn_builder_import, mfn_builder_import_page, importdata, importsinglepage, and importfromclipboard functions. This makes it possible for authenticated attackers, with contributor level permissions and above to inject a PHP Object. The additional presence of a POP chain would make it possible for attackers to execute code, retrieve sensitive data, delete files, etc..
References
Link | Resource |
---|---|
https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3861 | Third Party Advisory |
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt | Exploit Third Party Advisory |
https://muffingroup.com/betheme/ | Product |
Configurations
Information
Published : 2022-11-21 05:15
Updated : 2022-11-30 07:31
NVD link : CVE-2022-3861
Mitre link : CVE-2022-3861
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
muffingroup
- betheme