Lucene search

K
cveWordfenceCVE-2022-2438
HistorySep 06, 2022 - 6:15 p.m.

CVE-2022-2438

2022-09-0618:15:13
CWE-502
Wordfence
web.nvd.nist.gov
39
2
cve
2022
2438
wordpress
broken link checker
plugin
deserialization
vulnerability
nvd

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0.002

Percentile

57.7%

The Broken Link Checker plugin for WordPress is vulnerable to deserialization of untrusted input via the ‘$log_file’ value in versions up to, and including 1.11.16. This makes it possible for authenticated attackers with administrative privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.

Affected configurations

Nvd
Vulners
Node
managewpbroken_link_checkerRange<1.11.17wordpress
VendorProductVersionCPE
managewpbroken_link_checker*cpe:2.3:a:managewp:broken_link_checker:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "wpmudev",
    "product": "Broken Link Checker",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.11.16",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

Social References

More

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

High

EPSS

0.002

Percentile

57.7%