// For flags

CVE-2022-4120

Stop Spammers Security < 2022.6 - Unauthenticated PHP Object Injection

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Stop Spammers Security | Block Spam Users, Comments, Forms WordPress plugin before 2022.6 passes base64 encoded user input to the unserialize() PHP function when CAPTCHA are used as second challenge, which could lead to PHP Object injection if a plugin installed on the blog has a suitable gadget chain

El complemento Stop Spammers Security | Block Spam Users, Comments, Forms de WordPress anterior a 2022.6 pasa la entrada del usuario codificada en base64 a la función PHP unserialize() cuando se usa CAPTCHA como segundo desafío, lo que podría llevar a la inyección de objetos PHP si un complemento instalado en el blog tiene una cadena de gadgets adecuada

The Stop Spammers Security plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 2022.5 via deserialization of untrusted input when issuing a CPATCHA challenge. This allows unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. Note: The official PHP recommendation is not to pass untrusted input to unserialize even if the allowed_classes option is set to false.

*Credits: Seryeon Ham, WPScan
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-11-22 CVE Reserved
  • 2022-12-05 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-502: Deserialization of Untrusted Data
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Trumani
Search vendor "Trumani"
Stop Spammers
Search vendor "Trumani" for product "Stop Spammers"
< 2022.6
Search vendor "Trumani" for product "Stop Spammers" and version " < 2022.6"
wordpress
Affected