The Hash Form plugin for WordPress (up to v1.1.0) allows unauthenticated attackers to perform PHP Object Injection via 'process_entry' function, potentially leading to file deletion, data retrieval, or code execution
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | CVE-2024-5085 Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated PHP Object Injection | 23 May 202414:31 | – | vulnrichment |
![]() | CVE-2024-5085 | 23 May 202415:15 | – | cve |
![]() | Hash Form – Drag & Drop Form Builder < 1.1.1 - Unauthenticated PHP Object Injection | 23 May 202400:00 | – | wpvulndb |
![]() | WordPress Hash Form Plugin <= 1.1.0 is vulnerable to PHP Object Injection | 24 May 202400:00 | – | patchstack |
![]() | CVE-2024-5085 | 5 Feb 202506:21 | – | redhatcve |
![]() | CVE-2024-5085 Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated PHP Object Injection | 23 May 202414:31 | – | cvelist |
![]() | Wordfence Intelligence Weekly WordPress Vulnerability Report (May 20, 2024 to May 26, 2024) | 30 May 202415:23 | – | wordfence |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo