CVE-2023-3343Deserialization of Untrusted Data in User Registration

Severity
8.8HIGHNVD
EPSS
0.6%
top 29.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 13
Latest updateMay 2

Description

The User Registration plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 3.0.1 via deserialization of untrusted input from the 'profile-pic-url' parameter. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files,

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6rv8-qjf4-hjgv: The User Registration plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 32023-07-13
CVEList
User Registration <= 3.0.1 - Authenticated (Subscriber+) PHP Object Injection2023-07-13

📋Vendor Advisories

1
Red Hat
kernel: Bluetooth: HCI: Fix global-out-of-bounds2025-05-02
CVE-2023-3343 — Deserialization of Untrusted Data | cvebase