CVE-2024-10079
WP Easy Post Types <= 1.4.4 - Authenticated (Subscriber+) PHP Object Injection
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
The WP Easy Post Types plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.4.4 via deserialization of untrusted input from the 'text' parameter in the 'ajax_import_content' function. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
| CWE | CWE-502 |
| Vendor | chertz |
| Product | wp easy post types |
| Published | Oct 18, 2024 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for chertz wp easy post types
Be the first to know when new high vulnerabilities affecting chertz wp easy post types are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
chertz / WP Easy Post Types
0 ≤ 1.4.4
References
Credits
István Márton