Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shabti
Shabti frontend Admin By Dynamapps Wordpress Wordpress wordpress |
|
| Vendors & Products |
Shabti
Shabti frontend Admin By Dynamapps Wordpress Wordpress wordpress |
Thu, 26 Mar 2026 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to PHP Object Injection via deserialization of the 'post_content' of admin_form posts in all versions up to, and including, 3.28.31. This is due to the use of WordPress's `maybe_unserialize()` function without class restrictions on user-controllable content stored in admin_form post content. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to achieve remote code execution. | |
| Title | Frontend Admin by DynamiApps <= 3.28.31 - Authenticated (Editor+) PHP Object Injection via 'post_content' of Admin Form Posts | |
| Weaknesses | CWE-502 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-03-26T17:51:16.381Z
Reserved: 2026-02-27T14:10:06.693Z
Link: CVE-2026-3328
Updated: 2026-03-26T17:48:46.633Z
Status : Received
Published: 2026-03-26T04:17:11.663
Modified: 2026-03-26T04:17:11.663
Link: CVE-2026-3328
No data.
OpenCVE Enrichment
Updated: 2026-03-26T12:08:46Z