WordPress Plugin Vulnerabilities

Bold Page Builder < 3.1.6 - PHP Object Injection

Description

The bt_bb_get_grid AJAX action of the plugin passes user input into the unserialize() function without any validation or sanitisation, which could lead to a PHP Object Injection. Even though the plugin did not contain a suitable gadget to fully exploit the issue, other installed plugins on the blog could allow such issue to be exploited and lead to RCE in some cases.

This object injection is possible under the following circumstances:

1. A Page exists with a Masonry Post Grid. This post grid is a element, which can be added over the page builder inside a column.
2. The attacker must have access to that page

This requirements are in place because the vulnerable ajax callback function is protected by a nonce. This nonce is stored inside the post grid element. The ajax callback function can be called by unauthenticated users.

Proof of Concept

Affects Plugins

Fixed in 3.1.6

References

Classification

Type
OBJECT INJECTION
CWE

Miscellaneous

Original Researcher
dc11
Submitter
dc11
Verified
Yes

Timeline

Publicly Published
2021-08-02 (about 4 years ago)
Added
2021-08-02 (about 4 years ago)
Last Updated
2022-02-24 (about 3 years ago)

Other