cve/2022/CVE-2022-3334.md

19 lines
890 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-3334](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3334)
![](https://img.shields.io/static/v1?label=Product&message=Easy%20WP%20SMTP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.5.0%3C%201.5.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization%20of%20Untrusted%20Data&color=brighgreen)
### Description
The Easy WP SMTP WordPress plugin before 1.5.0 unserialises the content of an imported file, which could lead to PHP object injection issue when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.
### POC
#### Reference
- https://wpscan.com/vulnerability/0e735502-eaa2-4047-949e-bc8eb6b39fc9
2024-06-09 00:33:16 +00:00
- https://wpscan.com/vulnerability/0e735502-eaa2-4047-949e-bc8eb6b39fc9
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.