CVE-2023-6933

Scores

EPSS

0.930high93.0%
0%20%40%60%80%100%

Percentile: 93.0%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

The Better Search Replace plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.4 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-502

Exploits

Exploit ID: CVE-2023-6933

Source: github-poc

URL: https://github.com/Trex96/vulnerable-bsr-lab-CVE-2023-6933

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: better_search_replace

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:wpengine:better_search_replace:*:*:*:*:*:wordpress:*:*",      "versionEndExcluding": "1.4.5",      "vulnerable": true    }  ],  "operator": "...

Source: nvd

End of list