Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pxqp-jhw5-pvjr

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Version 3.3.23 of the Sassy Social Share WordPress plugin is vulnerable to PHP Object Injection via the wp_ajax_heateor_sss_import_config AJAX action due to deserialization of unvalidated user supplied inputs via the import_config function found in the ~/admin/class-sassy-social-share-admin.php file. This can be exploited by underprivileged authenticated users due to a missing capability check on the import_config function.

Version 3.3.23 of the Sassy Social Share WordPress plugin is vulnerable to PHP Object Injection via the wp_ajax_heateor_sss_import_config AJAX action due to deserialization of unvalidated user supplied inputs via the import_config function found in the ~/admin/class-sassy-social-share-admin.php file. This can be exploited by underprivileged authenticated users due to a missing capability check on the import_config function.

EPSS

Процентиль: 78%
0.01146
Низкий

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 8.8
nvd
больше 4 лет назад

Version 3.3.23 of the Sassy Social Share WordPress plugin is vulnerable to PHP Object Injection via the wp_ajax_heateor_sss_import_config AJAX action due to deserialization of unvalidated user supplied inputs via the import_config function found in the ~/admin/class-sassy-social-share-admin.php file. This can be exploited by underprivileged authenticated users due to a missing capability check on the import_config function.

EPSS

Процентиль: 78%
0.01146
Низкий

Дефекты

CWE-502