The BuddyForms WordPress plugin, in versions prior to 2.7.8, was affected by an unauthenticated insecure deserialization issue. An unauthenticated attacker could leverage this issue to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present.
- https://www.tenable.com/security/research/tra-2023-7
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cvemon
- https://github.com/JoshuaMart/JoshuaMart
- https://github.com/f0ur0four/Insecure-Deserialization
- https://github.com/mesudmammad1/CVE-2023-26326_Buddyform_exploit
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/omarelshopky/exploit_cve-2023-26326_using_cve-2024-2961
- https://github.com/ready-man/cms
- https://github.com/suce0155/CVE-2024-2961_buddyforms_2.7.7