Lucene search

K
wpvulndbWpvulndbWPVDB-ID:4F8E9564-E193-460D-B6FD-705A25C08D12
HistoryJan 12, 2024 - 12:00 a.m.

WooCommerce Tranzila Gateway <= 1.0.8 - Unauthenticated PHP Object Injection

2024-01-1200:00:00
wpscan.com
14
woocommerce
tranzila
gateway
php
object injection
unauthenticated
input
vulnerability
deserialization
wordpress
plugin
pop chain
additional plugin
theme
arbitrary files
sensitive data
code

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

31.1%

Description The Woocommerce Tranzila Payment Gateway plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0.8 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

31.1%

Related for WPVDB-ID:4F8E9564-E193-460D-B6FD-705A25C08D12