Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2023-26326

Description

The BuddyForms WordPress plugin, in versions prior to 2.7.8, was affected by an unauthenticated insecure deserialization issue. An unauthenticated attacker could leverage this issue to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present.

POC

Reference

- https://www.tenable.com/security/research/tra-2023-7

Github

- https://github.com/20142995/nuclei-templates

- https://github.com/ARPSyndicate/cvemon

- https://github.com/JoshuaMart/JoshuaMart

- https://github.com/f0ur0four/Insecure-Deserialization

- https://github.com/mesudmammad1/CVE-2023-26326_Buddyform_exploit

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/omarelshopky/exploit_cve-2023-26326_using_cve-2024-2961

- https://github.com/ready-man/cms

- https://github.com/suce0155/CVE-2024-2961_buddyforms_2.7.7