The bt_bb_get_grid AJAX action of the Bold Page Builder WordPress plugin before 3.1.6 passes user input into the unserialize() function without any validation or sanitisation, which could lead to a PHP Object Injection. Even though the plugin did not contain a suitable gadget to fully exploit the issue, other installed plugins on the blog could allow such issue to be exploited and lead to RCE in some cases.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/08edce3f-2746-4886-8439-76e44ec76fa8 | Exploit Third Party Advisory |
Configurations
History
02 Sep 2021, 15:26
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:* | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 8.8 |
References | (MISC) https://wpscan.com/vulnerability/08edce3f-2746-4886-8439-76e44ec76fa8 - Exploit, Third Party Advisory |
30 Aug 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-08-30 15:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-24579
Mitre link : CVE-2021-24579
CVE.ORG link : CVE-2021-24579
JSON object : View
Products Affected
bold-themes
- bold_page_builder
CWE
CWE-502
Deserialization of Untrusted Data