### [CVE-2023-2288](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2288) ![](https://img.shields.io/static/v1?label=Product&message=Otter&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%3C%202.2.6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization%20of%20Untrusted%20Data&color=brighgreen) ### Description The Otter WordPress plugin before 2.2.6 does not sanitize some user-controlled file paths before performing file operations on them. This leads to a PHAR deserialization vulnerability on PHP < 8.0 using the phar:// stream wrapper. ### POC #### Reference - https://wpscan.com/vulnerability/93acb4ee-1053-48e1-8b69-c09dc3b2f302 #### Github No PoCs found on GitHub currently.