Skip to main content

CVE-2022-2436: CWE-502 Deserialization of Untrusted Data in codename065 Download Manager

High
VulnerabilityCVE-2022-2436cvecve-2022-2436cwe-502
Published: Tue Sep 06 2022 (09/06/2022, 17:18:57 UTC)
Source: CVE
Vendor/Project: codename065
Product: Download Manager

Description

The Download Manager plugin for WordPress is vulnerable to deserialization of untrusted input via the 'file[package_dir]' parameter in versions up to, and including 3.2.49. This makes it possible for authenticated attackers with contributor privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.

AI-Powered Analysis

AILast updated: 07/05/2025, 21:58:12 UTC

Technical Analysis

CVE-2022-2436 is a high-severity vulnerability affecting the Download Manager plugin for WordPress, developed by codename065, specifically versions up to and including 3.2.49. The vulnerability arises from unsafe deserialization of untrusted data, classified under CWE-502. It is triggered via the 'file[package_dir]' parameter, which allows an authenticated attacker with at least contributor-level privileges to exploit the plugin. The attack vector involves the use of a PHAR (PHP Archive) wrapper to deserialize maliciously crafted PHP objects. Successful exploitation requires the attacker to upload a file containing a serialized payload. If a suitable Property Oriented Programming (POP) chain exists within the application or its dependencies, the attacker can leverage this to execute arbitrary PHP code, potentially leading to full compromise of the affected WordPress site. The vulnerability does not require user interaction beyond authentication, and the attack can be performed remotely over the network. The CVSS v3.1 base score is 8.8, indicating a high severity with network attack vector, low attack complexity, privileges required (low), no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits are currently known in the wild, but the vulnerability's nature and severity make it a significant risk, especially for websites using this plugin without patching or mitigation.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. WordPress is widely used across Europe for corporate websites, e-commerce platforms, and content management. The Download Manager plugin is popular for handling file downloads and digital asset management. Exploitation could lead to unauthorized code execution, data theft, defacement, or complete site takeover. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR where data breaches must be reported and can incur heavy fines. The ability to execute arbitrary PHP code could also allow attackers to pivot within the network, potentially compromising internal systems if the WordPress server is connected to corporate infrastructure. Given the plugin requires only contributor-level privileges, compromised or weak user accounts could facilitate exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, as attackers may develop exploits based on the public disclosure. Organizations relying on this plugin should consider the risk of targeted attacks, especially those in sectors with high-value data or critical online presence.

Mitigation Recommendations

1. Immediate upgrade or patching: Organizations should update the Download Manager plugin to a version where this vulnerability is fixed. If no patch is available, consider disabling or removing the plugin until a fix is released. 2. Restrict user privileges: Limit contributor and higher privileges to trusted users only, and review existing user accounts for unnecessary permissions. 3. Implement strict file upload controls: Enforce file type restrictions, scanning, and validation on all uploads to prevent malicious serialized payloads. 4. Web application firewall (WAF): Deploy or update WAF rules to detect and block attempts to exploit deserialization vulnerabilities, particularly targeting the 'file[package_dir]' parameter. 5. Monitor logs and alerts: Enable detailed logging of plugin activity and monitor for suspicious file uploads or unusual PHP object deserialization events. 6. Harden PHP environment: Disable PHAR stream wrappers if not required, and apply PHP hardening best practices to limit code execution risks. 7. Conduct regular security audits: Periodically review WordPress plugins and configurations for vulnerabilities and compliance with security policies. 8. Educate users: Train site administrators and contributors on secure practices and recognizing potential attack indicators.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdc1c2

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/5/2025, 9:58:12 PM

Last updated: 8/16/2025, 5:22:05 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats