Cyber Posture

CVE-2024-49699

High

Published: 21 January 2025

Published
21 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0459 89.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Deserialization of Untrusted Data vulnerability in reputeinfosystems ARPrice arprice allows Object Injection.This issue affects ARPrice: from n/a through <= 4.1.3.

Security Summary

CVE-2024-49699 is a Deserialization of Untrusted Data vulnerability (CWE-502) in the ARPrice WordPress plugin developed by reputeinfosystems, enabling PHP Object Injection. The issue affects all versions of ARPrice up to and including 4.1.3, allowing attackers to process untrusted data through unsafe deserialization mechanisms within the plugin.

The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable remotely over the network with low complexity and low privileges, such as an authenticated low-level WordPress user like a subscriber, without requiring user interaction. Successful exploitation can result in high-impact confidentiality, integrity, and availability violations, potentially allowing attackers to execute arbitrary code, steal data, modify content, or disrupt services on the targeted WordPress site.

Patchstack has published an advisory detailing the vulnerability, specifically referencing the object injection flaw in ARPrice version 4.0.3 and earlier, available at https://patchstack.com/database/Wordpress/Plugin/arprice/vulnerability/wordpress-arprice-plugin-4-0-3-php-object-injection-vulnerability?_s_id=cve. Practitioners should update to a patched version beyond 4.1.3 if available and review access controls for plugin endpoints.

Details

CWE(s)
CWE-502

References