The SEOPress WordPress plugin before 7.9 does not properly protect some of its REST API routes, which combined with another Object Injection vulnerability can allow unauthenticated attackers to unserialize malicious gadget chains, compromising the site if a suitable chain is present.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/28507376-ded0-4e1a-b2fc-2182895aa14c/ | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/28507376-ded0-4e1a-b2fc-2182895aa14c/ | Exploit Third Party Advisory |
Configurations
History
21 May 2025, 19:11
Type | Values Removed | Values Added |
---|---|---|
First Time |
Seopress seopress
Seopress |
|
References | () https://wpscan.com/vulnerability/28507376-ded0-4e1a-b2fc-2182895aa14c/ - Exploit, Third Party Advisory | |
CWE | CWE-502 | |
CPE | cpe:2.3:a:seopress:seopress:*:*:*:*:*:wordpress:*:* |
Information
Published : 2024-07-09 06:15
Updated : 2025-05-21 19:11
NVD link : CVE-2024-5488
Mitre link : CVE-2024-5488
CVE.ORG link : CVE-2024-5488
JSON object : View
Products Affected
seopress
- seopress
CWE
CWE-502
Deserialization of Untrusted Data