Description
WordPress is prone to a vulnerability that lets remote attackers inject and execute arbitrary code because the application fails to sanitize user-supplied input before being passed to the unserialize() PHP function. Attackers can possibly exploit this issue to execute arbitrary PHP code within the context of the affected webserver process. WordPress versions 4.2.x ranging from 4.2 and up to (and including) 4.2.29 are vulnerable.
Remediation
Update to WordPress version 4.2.30 or latest
References
https://github.com/JamesGeee/CVE-2020-36326
https://wordpress.org/support/wordpress-version/version-4-2-30/
Related Vulnerabilities
Dolibarr Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2022-0819)
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-6098)
WordPress Plugin W3 Total Cache PHP Code Injection (0.9.2.8)
WordPress Plugin GiveWP-Donation and Fundraising Platform Cross-Site Scripting (2.11.3)
Moodle Credentials Management Errors Vulnerability (CVE-2014-0008)