<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Object-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/object-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 21 Apr 2026 10:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/object-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>MetaSlider Responsive Slider Plugin Deserialization Vulnerability (CVE-2026-39467)</title><link>https://feed.craftedsignal.io/briefs/2026-04-metaslider-deserialization/</link><pubDate>Tue, 21 Apr 2026 10:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-metaslider-deserialization/</guid><description>A deserialization of untrusted data vulnerability in the MetaSlider Responsive Slider plugin for WordPress (versions up to 3.106.0) allows for unauthenticated object injection, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>CVE-2026-39467 is a critical vulnerability affecting the MetaSlider Responsive Slider plugin for WordPress. Specifically, it is a Deserialization of Untrusted Data vulnerability that can lead to Object Injection. The vulnerability exists in versions up to and including 3.106.0. An attacker can exploit this vulnerability to inject arbitrary PHP objects into the application, potentially leading to remote code execution. This is possible because the plugin deserializes data without proper validation, allowing malicious actors to manipulate serialized data and inject harmful objects. The vulnerability was reported by Patchstack. Given the widespread use of WordPress and the MetaSlider plugin, this vulnerability poses a significant risk to a large number of websites.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker sends a crafted HTTP request to a WordPress endpoint that processes MetaSlider plugin data.</li>
<li>The request contains a serialized PHP object designed for malicious purposes.</li>
<li>The MetaSlider plugin deserializes the untrusted data without proper sanitization or validation using <code>unserialize()</code>.</li>
<li>The deserialization process instantiates the malicious PHP object.</li>
<li>The injected object executes its malicious payload, potentially writing files to the server.</li>
<li>The attacker leverages the file write capability to plant a PHP webshell in the WordPress uploads directory.</li>
<li>The attacker accesses the webshell via a direct HTTP request.</li>
<li>The attacker executes arbitrary commands on the server via the webshell, gaining full control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39467 allows an unauthenticated attacker to inject arbitrary PHP objects, leading to remote code execution on the target WordPress server. This could result in complete compromise of the website, including data theft, defacement, or further attacks on internal networks. Given the popularity of MetaSlider, potentially thousands of websites are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the MetaSlider Responsive Slider plugin to the latest version to patch CVE-2026-39467.</li>
<li>Implement the Sigma rule <code>Detect MetaSlider Object Injection Attempt</code> to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious POST requests containing serialized PHP objects to WordPress endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>object-injection</category><category>deserialization</category><category>cve-2026-39467</category></item><item><title>Smart Post Show WordPress Plugin PHP Object Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-smart-post-show-rce/</link><pubDate>Tue, 14 Apr 2026 06:17:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-smart-post-show-rce/</guid><description>The Smart Post Show WordPress plugin versions 3.0.12 and earlier are vulnerable to PHP Object Injection via deserialization of untrusted input in the import_shortcodes() function, potentially leading to remote code execution if a suitable POP chain is present.</description><content:encoded><![CDATA[<p>The Smart Post Show WordPress plugin, specifically the Post Grid, Post Carousel &amp; Slider, and List Category Posts components, contains a PHP Object Injection vulnerability. This flaw affects all versions up to and including 3.0.12. The vulnerability resides in the <code>import_shortcodes()</code> function, where the deserialization of untrusted input occurs. This vulnerability requires an authenticated attacker with administrative privileges or higher. Successful exploitation requires the presence of a suitable Property-Oriented Programming (POP) chain within another installed plugin or theme. Without a POP chain, the injected object has no immediate impact. However, with a POP chain, attackers can potentially delete arbitrary files, retrieve sensitive data, or execute arbitrary code on the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains administrative-level access to the WordPress dashboard, either through credential compromise or vulnerability exploitation.</li>
<li>The attacker navigates to the Smart Post Show plugin settings page within the WordPress admin panel.</li>
<li>The attacker crafts a malicious payload containing a serialized PHP object designed to trigger a POP chain.</li>
<li>The attacker injects the malicious payload into the <code>import_shortcodes()</code> function, likely through a form field or file upload.</li>
<li>The <code>import_shortcodes()</code> function deserializes the attacker-controlled input, creating the malicious PHP object.</li>
<li>If a suitable POP chain exists within other installed plugins or themes, the deserialization triggers the chain.</li>
<li>The POP chain executes a series of predefined actions based on the objects and methods involved.</li>
<li>The final objective is achieved, such as deleting arbitrary files, retrieving sensitive data, or executing arbitrary code on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The PHP Object Injection vulnerability in the Smart Post Show WordPress plugin allows attackers to potentially gain remote code execution on the affected server. The impact is contingent on the existence of a POP chain within other installed plugins or themes. If successful, an attacker could potentially compromise the entire web server, leading to data breaches, defacement, or complete system takeover. Given the widespread use of WordPress and this plugin, a successful exploit could affect numerous websites across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Smart Post Show plugin to a version greater than 3.0.12 to patch CVE-2026-3017.</li>
<li>Deploy the Sigma rule &ldquo;Detect WordPress Plugin Deserialization Attempt&rdquo; to monitor for suspicious deserialization activity on WordPress servers.</li>
<li>Audit all installed WordPress plugins and themes for potential POP chains that could be exploited in conjunction with this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>php</category><category>object-injection</category><category>rce</category></item><item><title>Everest Forms WordPress Plugin PHP Object Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-everest-forms-rce/</link><pubDate>Wed, 08 Apr 2026 02:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-everest-forms-rce/</guid><description>The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection (CVE-2026-3296) in versions up to 3.4.3, allowing unauthenticated attackers to execute arbitrary code by injecting serialized PHP objects via form fields.</description><content:encoded><![CDATA[<p>The Everest Forms plugin for WordPress, a widely used form builder, contains a critical PHP Object Injection vulnerability (CVE-2026-3296) affecting versions up to and including 3.4.3. This vulnerability stems from the insecure deserialization of user-supplied data within the <code>html-admin-page-entries-view.php</code> file. Specifically, the plugin uses PHP&rsquo;s <code>unserialize()</code> function on form entry metadata stored in the <code>wp_evf_entrymeta</code> table without specifying allowed classes, creating an exploitable condition. An unauthenticated attacker can inject malicious serialized PHP objects through any public form field. The <code>sanitize_text_field()</code> function fails to prevent these attacks because it doesn&rsquo;t strip serialization control characters. This allows attackers to execute arbitrary PHP code on the WordPress server when an administrator views form entries. This vulnerability poses a significant risk to WordPress sites using the Everest Forms plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker submits a malicious serialized PHP object through a public Everest Forms form field.</li>
<li>The submitted payload bypasses the <code>sanitize_text_field()</code> function due to the function&rsquo;s failure to remove serialization control characters.</li>
<li>The crafted serialized object is stored in the <code>wp_evf_entrymeta</code> database table associated with the form entry.</li>
<li>An administrator accesses the WordPress administration panel and navigates to the Everest Forms entries section.</li>
<li>The <code>html-admin-page-entries-view.php</code> file is executed to display form entries and their associated metadata.</li>
<li>The plugin retrieves the stored serialized object from the <code>wp_evf_entrymeta</code> table.</li>
<li>The <code>unserialize()</code> function is called on the retrieved data <em>without</em> the <code>allowed_classes</code> parameter, triggering PHP Object Injection.</li>
<li>The injected PHP object is instantiated, leading to arbitrary PHP code execution on the server, potentially granting the attacker complete control over the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-3296) can lead to complete compromise of the WordPress website. An attacker can gain remote code execution, allowing them to inject malware, deface the site, steal sensitive data (including user credentials and financial information), or use the compromised server as part of a botnet. Given the widespread use of the Everest Forms plugin, a large number of WordPress sites are potentially vulnerable. The CVSS v3.1 base score of 9.8 reflects the critical severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Everest Forms plugin to the latest version (greater than 3.4.3) to patch CVE-2026-3296.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious unserialize Call in Everest Forms</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious POST requests to WordPress form submission endpoints containing serialized PHP objects, as detected by the <code>Detect Suspicious Form Submission with Serialized Data</code> Sigma rule.</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests containing serialized PHP objects in form submission data.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>php</category><category>object-injection</category><category>rce</category><category>cve-2026-3296</category></item></channel></rss>