The wpDataTables WordPress plugin before 2.1.66 does not validate the "Serialized PHP array" input data before deserializing the data. This allows admins to deserialize arbitrary data which may lead to remote code execution if a suitable gadget chain is present on the server. This is impactful in environments where admin users should not be allowed to execute arbitrary code, such as multisite.
History

Wed, 23 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2023-09-11T19:46:06.952Z

Updated: 2025-04-23T16:16:49.088Z

Reserved: 2023-08-11T19:07:52.418Z

Link: CVE-2023-4314

cve-icon Vulnrichment

Updated: 2024-08-02T07:24:04.604Z

cve-icon NVD

Status : Modified

Published: 2023-09-11T20:15:12.310

Modified: 2025-04-23T17:16:43.797

Link: CVE-2023-4314

cve-icon Redhat

No data.