CVE-2023-52202
📋 TL;DR
This CVE describes a PHP object injection vulnerability in the HTML5 MP3 Player with Folder Feedburner Playlist Free WordPress plugin. Attackers can exploit deserialization of untrusted data to execute arbitrary code on affected WordPress sites. All users of this plugin versions up to 2.8.0 are vulnerable.
💻 Affected Systems
- HTML5 MP3 Player with Folder Feedburner Playlist Free WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, and website defacement.
Likely Case
Arbitrary code execution allowing attackers to install backdoors, steal sensitive data, or pivot to other systems.
If Mitigated
Limited impact with proper network segmentation and minimal privileges, but still potential for plugin-level compromise.
🎯 Exploit Status
Public exploit details available on Patchstack, making exploitation straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.8.1 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find 'HTML5 MP3 Player with Folder Feedburner Playlist Free'. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete the plugin immediately.
🔧 Temporary Workarounds
Disable Plugin
allDeactivate and remove the vulnerable plugin from WordPress
wp plugin deactivate html5-mp3-player-with-mp3-folder-feedburner-playlist
wp plugin delete html5-mp3-player-with-mp3-folder-feedburner-playlist
WAF Rule
allImplement WAF rules to block deserialization attempts
Add rule to block requests containing serialized PHP objects in POST/PUT data
🧯 If You Can't Patch
- Immediately deactivate and remove the plugin from all WordPress installations
- Implement strict network segmentation to isolate WordPress instances from critical systems
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins for 'HTML5 MP3 Player with Folder Feedburner Playlist Free' version 2.8.0 or earlier
Check Version:
wp plugin get html5-mp3-player-with-mp3-folder-feedburner-playlist --field=version
Verify Fix Applied:
Verify plugin version is 2.8.1 or later, or confirm plugin is completely removed
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to WordPress admin-ajax.php or plugin endpoints
- PHP errors related to unserialize() or object injection
Network Indicators:
- HTTP requests containing serialized PHP objects (O: or a: patterns)
- Traffic to known exploit payloads
SIEM Query:
source="wordpress.log" AND ("unserialize" OR "admin-ajax.php") AND status=200
🔗 References
- https://patchstack.com/database/vulnerability/html5-mp3-player-with-mp3-folder-feedburner-playlist/wordpress-html5-mp3-player-with-folder-feedburner-plugin-2-8-0-php-object-injection-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/html5-mp3-player-with-mp3-folder-feedburner-playlist/wordpress-html5-mp3-player-with-folder-feedburner-plugin-2-8-0-php-object-injection-vulnerability?_s_id=cve