NextGEN Gallery geo <= 1.0 - Unauthenticated PHP Object InjectionSign up to our free email alerts service for instant vulnerability notifications!
The plugin nextgen-gallery-geo insecurely trusts serialized data submitted over AJAX requests. This opens up the site to a PHP object injection vulnerability potential exploit vector. The original researcher notified the WordPress Plugins team.
|Proof of Concept||
Attack is exploitable over AJAX calls sites with the nextgen-gallery-geo Plugin.
|Publicly Published||2017-04-27 (4 months ago)|
|Added||2017-05-21 (3 months ago)|
|Last Updated||2017-05-21 (3 months ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|