CVE-2025-7825 (CNNVD-202510-510)
中文标题:
WordPress plugin The Schema Plugin For Divi, Gutenberg & Shortcodes 安全漏洞
英文标题:
Schema Plugin For Divi, Gutenberg & Shortcodes <= 4.3.2 - Authenticated (Contributor+) Object Instantiation
漏洞描述
中文描述:
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin The Schema Plugin For Divi, Gutenberg & Shortcodes 4.3.2及之前版本存在安全漏洞,该漏洞源于反序列化不可信输入,可能导致PHP对象注入。
英文描述:
The Schema Plugin For Divi, Gutenberg & Shortcodes plugin for WordPress is vulnerable to Object Instantiation in all versions up to, and including, 4.3.2 via deserialization of untrusted input via the wpt_schema_breadcrumbs shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| wpt00ls | Schema Plugin For Divi, Gutenberg & Shortcodes | - | ≤ 4.3.2 | - |
cpe:2.3:a:wpt00ls:schema_plugin_for_divi,_gutenberg_&_shortcodes:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-7825 |
2025-11-11 15:23:36 | 2025-11-11 07:40:52 |
| NVD | nvd_CVE-2025-7825 |
2025-11-11 15:01:04 | 2025-11-11 07:48:38 |
| CNNVD | cnnvd_CNNVD-202510-510 |
2025-11-11 15:12:27 | 2025-11-11 08:00:21 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202510-510
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']