CVE-2023-28667
CVSS V2 None
CVSS V3 None
Description
The Lead Generated WordPress Plugin, version <= 1.23, was affected by an unauthenticated insecure deserialization issue. The tve_labels parameter of the tve_api_form_submit action is passed to the PHP unserialize() function without being sanitized or verified, and as a result could lead to PHP object injection, which when combined with certain class implementations / gadget chains could be leveraged to perform a variety of malicious actions granted a POP chain is also present.
Overview
- CVE ID
- CVE-2023-28667
- Assigner
- vulnreport@tenable.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-22T21:15:19
- Last Modified Date
- 2023-03-28T19:41:21
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:leadgenerated:lead_generated:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.25 |
References
Reference URL | Reference Tags |
---|---|
https://www.tenable.com/security/research/tra-2023-7 | Exploit Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-28667 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28667 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 03:13:27 | Added to TrackCVE | |||
2023-04-17 03:13:29 | Weakness Enumeration | new |