This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: PHP Object Injection via untrusted data deserialization. π₯ **Consequences**: Attackers can inject malicious objects, leading to full system compromise, data theft, or service disruption.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: CWE-502 (Deserialization of Untrusted Data). The plugin fails to validate/sanitize data before passing it to PHP's `unserialize()` function.
Q3Who is affected? (Versions/Components)
π¦ **Affected**: WordPress Plugin **Classter** by ThemeREX. π **Versions**: 2.5 and earlier. π **Platform**: WordPress sites running this specific theme/plugin.
Q4What can hackers do? (Privileges/Data)
π΅οΈ **Capabilities**: Remote Code Execution (RCE), arbitrary file manipulation, database access. π **Impact**: High (CVSS H). Full control over the server environment and sensitive data exposure.
Q5Is exploitation threshold high? (Auth/Config)
π **Threshold**: **LOW**. CVSS indicates: Network Accessible (AV:N), Low Complexity (AC:L), No Privileges Required (PR:N), No User Interaction (UI:N). Easy to exploit remotely.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Exploit Status**: No public PoC/Exploit listed in the provided data. However, the vulnerability type is well-known, making custom exploits likely available in the wild.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for WordPress sites running **Classter** theme/plugin version β€ 2.5. Look for endpoints triggering PHP object deserialization or unusual HTTP requests containing serialized payloads.
Q8Is it fixed officially? (Patch/Mitigation)
π οΈ **Fix**: Update Classter plugin/theme to the latest version released by ThemeREX. π **Reference**: Check Patchstack database for official patch details.
Q9What if no patch? (Workaround)
π§ **Workaround**: If unpatched, restrict web server access to plugin directories, disable PHP execution in upload folders, and implement strict WAF rules to block serialized object payloads.
Q10Is it urgent? (Priority Suggestion)
β‘ **Priority**: **CRITICAL**. High CVSS score (likely 9.8+), no auth required, and direct path to RCE. Immediate patching is strongly recommended to prevent takeover.