cve/2022/CVE-2022-3334.md

18 lines
817 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-3334](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3334)
![](https://img.shields.io/static/v1?label=Product&message=Easy%20WP%20SMTP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.5.0%3C%201.5.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization%20of%20Untrusted%20Data&color=brighgreen)
### Description
The Easy WP SMTP WordPress plugin before 1.5.0 unserialises the content of an imported file, which could lead to PHP object injection issue when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.
### POC
#### Reference
- https://wpscan.com/vulnerability/0e735502-eaa2-4047-949e-bc8eb6b39fc9
#### Github
No PoCs found on GitHub currently.