CVE-2023-28667

CVSS V2 None CVSS V3 None
Description
The Lead Generated WordPress Plugin, version <= 1.23, was affected by an unauthenticated insecure deserialization issue. The tve_labels parameter of the tve_api_form_submit action is passed to the PHP unserialize() function without being sanitized or verified, and as a result could lead to PHP object injection, which when combined with certain class implementations / gadget chains could be leveraged to perform a variety of malicious actions granted a POP chain is also present.
Overview
  • CVE ID
  • CVE-2023-28667
  • Assigner
  • vulnreport@tenable.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-03-22T21:15:19
  • Last Modified Date
  • 2023-03-28T19:41:21
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:leadgenerated:lead_generated:*:*:*:*:*:wordpress:*:* 1 OR 1.25
References
Reference URL Reference Tags
https://www.tenable.com/security/research/tra-2023-7 Exploit Third Party Advisory
History
Created Old Value New Value Data Type Notes
2023-04-17 03:13:27 Added to TrackCVE
2023-04-17 03:13:29 Weakness Enumeration new