White Label CMS < 2.5 - Admin+ PHP Object Injection. Unserialization of user input via settings allows high-privilege users to perform PHP Object Injection if a suitable gadget is present. To simulate, create a file named "import.txt" with code: O:4:"Evil":0:{}; and import via "Import Settings" feature in White Label CMS
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | CVE-2022-4302 White Label CMS < 2.5 - Admin+ PHP Object Injection | 2 Jan 202321:49 | – | vulnrichment |
![]() | Design/Logic Flaw | 2 Jan 202322:15 | – | prion |
![]() | White Label CMS < 2.5 - Admin+ PHP Object Injection | 8 Dec 202200:00 | – | wpexploit |
![]() | CVE-2022-4302 | 2 Jan 202322:15 | – | cve |
![]() | CVE-2022-4302 White Label CMS < 2.5 - Admin+ PHP Object Injection | 2 Jan 202321:49 | – | cvelist |
![]() | WordPress White Label CMS Plugin < 2.5 PHP Object Injection Vulnerability | 3 Jan 202300:00 | – | openvas |
![]() | CVE-2022-4302 | 2 Jan 202322:15 | – | nvd |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo