The Lead Generated WordPress Plugin, version <= 1.23, was affected by an unauthenticated insecure deserialization issue. The tve_labels parameter of the tve_api_form_submit action is passed to the PHP unserialize() function without being sanitized or verified, and as a result could lead to PHP object injection, which when combined with certain class implementations / gadget chains could be leveraged to perform a variety of malicious actions granted a POP chain is also present.
References
Link Resource
https://www.tenable.com/security/research/tra-2023-7 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: tenable

Published: 2023-03-22T00:00:00

Updated: 2023-03-22T00:00:00

Reserved: 2023-03-20T00:00:00


Link: CVE-2023-28667

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-03-22T21:15:19.190

Modified: 2023-03-28T19:41:21.357


Link: CVE-2023-28667

JSON object: View

cve-icon Redhat Information

No data.

CWE