
Cloud Vulnerability DB
A community-led vulnerabilities database
The ravpage plugin for WordPress contains a PHP Object Injection vulnerability (CVE-2024-13789) affecting all versions up to and including 2.31. The vulnerability was discovered and reported by Wordfence, with the initial disclosure made on February 20, 2025 (NVD).
The vulnerability stems from the unsafe deserialization of untrusted input from the 'paramsv2' parameter. This security flaw allows unauthenticated attackers to inject PHP Objects into the application. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a critical severity level with network accessibility, low attack complexity, and no required privileges or user interaction (Wordfence).
While the vulnerability allows for PHP Object Injection, its actual impact depends on the presence of a POP (Property-Oriented Programming) chain in other installed plugins or themes. If a suitable POP chain exists, attackers could potentially delete arbitrary files, retrieve sensitive data, or execute arbitrary code on the affected system (NVD).
Users of the ravpage WordPress plugin should update to a version newer than 2.31 once available. In the meantime, website administrators should carefully evaluate the necessity of the plugin and consider temporarily disabling it if not critical to website operations (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."