๐Ÿ” CVE Alert

CVE-2022-3861

HIGH 8.8

Betheme <= 26.5.1.4 - Authenticated (Subscriber+) PHP Object Injection

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

The Betheme theme for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 26.5.1.4 via deserialization of untrusted input supplied via the import, mfn-items-import-page, and mfn-items-import parameters passed through the mfn_builder_import, mfn_builder_import_page, importdata, importsinglepage, and importfromclipboard functions. This makes it possible for authenticated attackers, with subscriber level permissions and above to inject a PHP Object. The additional presence of a POP chain would make it possible for attackers to execute code, retrieve sensitive data, delete files, etc..

CWE CWE-502
Vendor muffingroup
Product betheme
Published Nov 21, 2022
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for muffingroup betheme

Be the first to know when new high vulnerabilities affecting muffingroup betheme are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

MuffinGroup / Betheme
0 โ‰ค 26.5.1.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/f5e984d5-2537-4a4a-a071-084e0c1c3b5e?source=cve muffingroup.com: https://muffingroup.com/betheme/ github.com: https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt wordfence.com: https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3861

Credits

Julien Ahrens