Description
The Betheme theme for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 26.5.1.4 via deserialization of untrusted input supplied via the import, mfn-items-import-page, and mfn-items-import parameters passed through the mfn_builder_import, mfn_builder_import_page, importdata, importsinglepage, and importfromclipboard functions. This makes it possible for authenticated attackers, with subscriber level permissions and above to inject a PHP Object. The additional presence of a POP chain would make it possible for attackers to execute code, retrieve sensitive data, delete files, etc..
References (4)
Core 4
Core References
Exploit, Third Party Advisory
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3861.txt
Product
https://muffingroup.com/betheme/
Third Party Advisory
https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3861
Scores
CVSS v3
8.8
EPSS
0.0459
EPSS Percentile
89.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-502
Status
published
Products (2)
MuffinGroup/Betheme
< 26.5.1.4
muffingroup/betheme
< 26.6
Published
Nov 21, 2022
Tracked Since
Feb 18, 2026