Description
WordPress is prone to multiple vulnerabilities, including deserialization and PHP file upload vulnerabilities. Exploiting these issues could allow an attacker to call arbitrary PHP Objects that can be used to perform a variety of malicious actions, granted a POP chain is also present or to upload arbitrary code and run it in the context of the webserver process, which may facilitate unauthorized access or privilege escalation. WordPress versions 6.2.x ranging from 6.2 and up to (and including) 6.2.3 are vulnerable.
Remediation
Update to WordPress version 6.2.4 or latest
References
Related Vulnerabilities
WordPress Plugin Work The Flow File Upload Arbitrary File Upload (2.3.1)
WordPress Plugin WP Code Highlight.js Cross-Site Request Forgery (0.6.2)
Jboss EAP Improper Neutralization of CRLF Sequences ('CRLF Injection') Vulnerability (CVE-2016-4993)
WordPress Plugin Smash Balloon Social Post Feed Unspecified Vulnerability (2.4.2)