The Betheme theme for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 26.5.1.4 via deserialization of untrusted input supplied via the import, mfn-items-import-page, and mfn-items-import parameters passed through the mfn_builder_import, mfn_builder_import_page, importdata, importsinglepage, and importfromclipboard functions. This makes it possible for authenticated attackers, with contributor level permissions and above to inject a PHP Object. The additional presence of a POP chain would make it possible for attackers to execute code, retrieve sensitive data, delete files, etc..
References
Link | Resource |
---|---|
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt | Exploit Third Party Advisory |
https://muffingroup.com/betheme/ | Product |
https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3861 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2022-11-21T12:45:46.108Z
Updated:
Reserved: 2022-11-04T13:47:00.257Z
Link: CVE-2022-3861
JSON object: View
NVD Information
Status : Modified
Published: 2022-11-21T13:15:10.273
Modified: 2023-11-07T03:51:53.920
Link: CVE-2022-3861
JSON object: View
Redhat Information
No data.
CWE