CVE-2023-51470

9.9 CRITICAL

📋 TL;DR

This vulnerability allows authenticated attackers to perform PHP object injection through deserialization of untrusted data in the Rencontre WordPress dating site plugin. Attackers can execute arbitrary code, potentially leading to complete system compromise. All WordPress sites using Rencontre plugin versions up to 3.11.1 are affected.

💻 Affected Systems

Products:
  • Rencontre - Dating Site WordPress Plugin
Versions: n/a through 3.11.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access, but any authenticated user can potentially exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with remote code execution, data theft, website defacement, and installation of persistent backdoors.

🟠

Likely Case

Unauthorized administrative access, data exfiltration of user information, and installation of malware or cryptocurrency miners.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and least privilege principles are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated access but is relatively simple to execute once authentication is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.11.2 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/rencontre/wordpress-rencontre-plugin-3-11-1-authenticated-php-object-injection-vulnerability

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Rencontre plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 3.11.2+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Rencontre Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate rencontre

Web Application Firewall Rule

all

Block malicious deserialization attempts at the WAF level

🧯 If You Can't Patch

  • Restrict plugin access to trusted users only and implement strong authentication controls
  • Implement network segmentation to isolate the WordPress instance from critical systems

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Rencontre version. If version is 3.11.1 or earlier, system is vulnerable.

Check Version:

wp plugin list --name=rencontre --field=version

Verify Fix Applied:

Verify Rencontre plugin version is 3.11.2 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to Rencontre plugin endpoints
  • PHP error logs containing unserialize() warnings
  • Unexpected file creation in wp-content/uploads

Network Indicators:

  • HTTP requests with serialized PHP objects in parameters
  • Outbound connections to suspicious IPs from WordPress server

SIEM Query:

source="wordpress.log" AND "rencontre" AND ("unserialize" OR "POST" AND status=200)

🔗 References

📤 Share & Export