
Cloud Vulnerability DB
A community-led vulnerabilities database
The WP Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'currentthemeroot' parameter in versions up to and including 1.2.9. This vulnerability was addressed in version 1.2.9.1 released in September 2024 (WP Plugin Repo).
The vulnerability involves a PHP deserialization issue where untrusted input from the 'currentthemeroot' parameter could be processed without proper sanitization. The issue was specifically related to PHAR deserialization, as evidenced by code changes in version 1.2.9.1 that added sanitization for PHAR URLs by removing the 'phar://' scheme prefix before file operations (WP Plugin Repo).
A successful exploitation of this vulnerability could potentially allow authenticated users with administrative privileges to execute arbitrary code on the affected WordPress installation through PHP deserialization attacks (Wordfence).
Users are strongly advised to update to version 1.2.9.1 or later of the WP Editor plugin, which includes security fixes that properly sanitize inputs to prevent the deserialization vulnerability (WP Plugin Repo).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."