{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-4120","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","state":"PUBLISHED","assignerShortName":"WPScan","dateReserved":"2022-11-22T15:34:37.890Z","datePublished":"2022-12-26T12:28:19.897Z","dateUpdated":"2025-04-14T13:24:34.260Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-01-10T09:10:50.096Z"},"title":"Stop Spammers Security < 2022.6 - Unauthenticated PHP Object Injection","problemTypes":[{"descriptions":[{"description":"CWE-502 Deserialization of Untrusted Data","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"Stop Spammers Security | Block Spam Users, Comments, Forms","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"2022.6"}],"defaultStatus":"unaffected","collectionURL":"https://wordpress.org/plugins"}],"descriptions":[{"lang":"en","value":"The Stop Spammers Security | Block Spam Users, Comments, Forms WordPress plugin before 2022.6 passes base64 encoded user input to the unserialize() PHP function when CAPTCHA are used as second challenge, which could lead to PHP Object injection if a plugin installed on the blog has a suitable gadget chain"}],"references":[{"url":"https://wpscan.com/vulnerability/e8bb79db-ef77-43be-b449-4c4b5310eedf","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"Seryeon Ham","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:27:54.483Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/e8bb79db-ef77-43be-b449-4c4b5310eedf","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T13:24:15.379574Z","id":"CVE-2022-4120","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-14T13:24:34.260Z"}}]}}