<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Php-Object-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/php-object-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/php-object-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Profile Builder Pro Plugin PHP Object Injection Vulnerability (CVE-2026-7647)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-profile-builder-rce/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-profile-builder-rce/</guid><description>An unauthenticated PHP Object Injection vulnerability exists in the Profile Builder Pro WordPress plugin (versions up to 3.14.5) due to the insecure use of `maybe_unserialize()` on the 'args' POST parameter in the `wppb_request_users_pins_action_callback()` AJAX handler, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>The Profile Builder Pro plugin for WordPress is susceptible to a critical PHP Object Injection vulnerability (CVE-2026-7647) affecting all versions up to and including 3.14.5. This flaw stems from the plugin&rsquo;s use of the <code>maybe_unserialize()</code> function on the attacker-controlled <code>args</code> POST parameter passed to the <code>wppb_request_users_pins_action_callback()</code> AJAX handler. Critically, this handler lacks nonce verification, input validation, and type checking, making it accessible to unauthenticated users via both <code>wp_ajax_</code> and <code>wp_ajax_nopriv_</code> hooks. Successful exploitation allows remote, unauthenticated attackers to inject arbitrary PHP objects into the application&rsquo;s memory space, potentially leading to remote code execution depending on available classes and application configuration. The vulnerability was published on 2026-05-02.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site running a vulnerable version (&lt;= 3.14.5) of the Profile Builder Pro plugin.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the WordPress AJAX endpoint (<code>/wp-admin/admin-ajax.php</code>).</li>
<li>The POST request includes the <code>action</code> parameter set to <code>wppb_request_users_pins_action_callback</code>.</li>
<li>The POST request includes the <code>args</code> parameter containing a serialized PHP object designed to trigger arbitrary code execution upon deserialization.</li>
<li>The WordPress server receives the request and invokes the <code>wppb_request_users_pins_action_callback()</code> function.</li>
<li>The vulnerable function calls <code>maybe_unserialize()</code> on the attacker-controlled <code>args</code> parameter without proper sanitization or validation.</li>
<li>The malicious PHP object is deserialized and injected into the application&rsquo;s memory space.</li>
<li>The injected object&rsquo;s methods and properties are triggered, leading to arbitrary code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary PHP code on the target WordPress server. This can lead to complete system compromise, including data theft, website defacement, and the installation of backdoors for persistent access. Given the widespread use of WordPress and the Profile Builder Pro plugin, a large number of websites are potentially at risk until the plugin is updated.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Profile Builder Pro plugin to the latest available version to patch CVE-2026-7647.</li>
<li>Deploy the provided Sigma rule <code>Detect Profile Builder Pro PHP Object Injection Attempt</code> to detect exploitation attempts targeting the vulnerable AJAX endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>wppb_request_users_pins_action_callback</code> and suspicious serialized data in the <code>args</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>php-object-injection</category><category>wordpress</category><category>plugin</category><category>rce</category></item></channel></rss>