The Advanced Database Cleaner plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.3 via deserialization of untrusted input in the 'process_bulk_action' function. This makes it possible for authenticated attacker, with administrator access and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-02-05T21:22:03.271Z
Updated: 2024-02-05T21:22:03.271Z
Reserved: 2024-01-17T20:53:53.251Z
Link: CVE-2024-0668
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-02-05T22:16:03.700
Modified: 2024-02-13T16:24:26.927
Link: CVE-2024-0668
JSON object: View
Redhat Information
No data.
CWE