The WP All Import Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.9.7 via deserialization of untrusted input from an import file. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
History

Tue, 11 Feb 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Soflyy
Soflyy wp All Import
CPEs cpe:2.3:a:soflyy:wp_all_import:*:*:*:*:pro:wordpress:*:*
Vendors & Products Soflyy
Soflyy wp All Import

Fri, 07 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 07 Feb 2025 15:30:00 +0000

Type Values Removed Values Added
Description The WP All Import Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.9.7 via deserialization of untrusted input from an import file. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
Title WP All Import Pro <= 4.9.7 - Authenticated (Administrator+) PHP Object Injection via Import File
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-02-07T15:32:12.342Z

Reserved: 2024-10-08T21:34:30.089Z

Link: CVE-2024-9664

cve-icon Vulnrichment

Updated: 2025-02-07T15:32:04.171Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-07T16:15:39.470

Modified: 2025-02-11T19:16:44.527

Link: CVE-2024-9664

cve-icon Redhat

No data.