
Cloud Vulnerability DB
A community-led vulnerabilities database
The Timeline Event History plugin for WordPress contains a PHP Object Injection vulnerability (CVE-2024-5726) affecting all versions up to and including 3.1. The vulnerability was discovered and disclosed on July 17, 2024. The issue exists in the deserialization of untrusted input via the 'timelines-data' parameter (NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The issue affects authenticated users with Contributor-level access and above, who can exploit the PHP Object Injection vulnerability. While no known POP (Property Oriented Programming) chain is present in the vulnerable software itself, the presence of additional plugins or themes could provide the necessary chain for exploitation (NVD).
If successfully exploited through a POP chain provided by additional plugins or themes, this vulnerability could allow attackers to delete arbitrary files, retrieve sensitive data, or execute code on the target system (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."