// For flags

CVE-2023-4314

wpDataTables < 2.1.66 - Admin+ PHP Object Injection

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The wpDataTables WordPress plugin before 2.1.66 does not validate the "Serialized PHP array" input data before deserializing the data. This allows admins to deserialize arbitrary data which may lead to remote code execution if a suitable gadget chain is present on the server. This is impactful in environments where admin users should not be allowed to execute arbitrary code, such as multisite.

El complemento de WordPress wpDataTables anterior a 2.1.66 no valida los datos de entrada de la "Serialized PHP array" antes de deserializar los datos. Esto permite a los administradores deserializar datos arbitrarios, lo que puede conducir a la ejecución remota de código si hay una cadena de dispositivos adecuada en el servidor. Esto tiene un impacto en entornos donde no se debe permitir que los usuarios administradores ejecuten código arbitrario, como multisitio.

The wpDataTables - Tables & Table Charts plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 2.1.65 via deserialization of untrusted input in multiple functions. This allows authenticated attackers with administrator capabilities to inject a PHP Object. The additional presence of a POP chain may allow attackers to delete arbitrary files.

*Credits: Jonatas Souza Villa Flor, WPScan
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Multiple
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-08-11 CVE Reserved
  • 2023-08-16 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-02 First Exploit
  • 2024-12-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-502: Deserialization of Untrusted Data
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tms-outsource
Search vendor "Tms-outsource"
Wpdatatables
Search vendor "Tms-outsource" for product "Wpdatatables"
< 2.1.66
Search vendor "Tms-outsource" for product "Wpdatatables" and version " < 2.1.66"
wordpress
Affected