Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5724: CWE-502 Deserialization of Untrusted Data in webhuntinfotech Photo Video Gallery Master

0
High
VulnerabilityCVE-2024-5724cvecve-2024-5724cwe-502
Published: Wed Jun 19 2024 (06/19/2024, 03:12:31 UTC)
Source: CVE Database V5
Vendor/Project: webhuntinfotech
Product: Photo Video Gallery Master

Description

CVE-2024-5724 is a high-severity PHP Object Injection vulnerability in the Photo Video Gallery Master WordPress plugin up to version 1. 5. 3. It arises from unsafe deserialization of untrusted input via the 'PVGM_all_photos_details' parameter. Authenticated users with Contributor-level access or higher can exploit this flaw to inject malicious PHP objects. While the plugin itself lacks a known POP chain, exploitation becomes possible if other plugins or themes installed on the target system provide such chains, potentially enabling arbitrary file deletion, sensitive data disclosure, or remote code execution. No public exploits are currently known. The vulnerability affects all versions of the plugin and requires no user interaction beyond authentication. Organizations using this plugin should prioritize patching or mitigation to prevent severe confidentiality, integrity, and availability impacts.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:47:28 UTC

Technical Analysis

CVE-2024-5724 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting the Photo Video Gallery Master plugin for WordPress in all versions up to and including 1.5.3. The flaw stems from the plugin's unsafe handling of the 'PVGM_all_photos_details' parameter, which is deserialized without proper validation or sanitization. This allows authenticated attackers with Contributor-level privileges or higher to perform PHP Object Injection by crafting malicious serialized objects. Although the plugin itself does not contain a known Property Oriented Programming (POP) chain to facilitate exploitation, the presence of additional plugins or themes on the target WordPress installation that provide such chains could enable attackers to leverage this vulnerability for critical actions such as arbitrary file deletion, sensitive data retrieval, or remote code execution. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high severity due to network attack vector, low attack complexity, required privileges, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the risk is significant given the widespread use of WordPress and the potential for privilege escalation and system compromise through this vector.

Potential Impact

The impact of CVE-2024-5724 is substantial for organizations using the Photo Video Gallery Master plugin. Exploitation can lead to full compromise of the affected WordPress site, including unauthorized deletion of files, exposure of sensitive information, and remote code execution. This can result in data breaches, website defacement, service disruption, and potential lateral movement within the hosting environment. Since the vulnerability requires only Contributor-level access, attackers who gain such access through other means (e.g., phishing, weak credentials) can escalate their privileges and control the site. The broad availability of WordPress and the plugin increases the attack surface globally, potentially affecting websites ranging from small businesses to large enterprises relying on WordPress for content management. The absence of a known exploit currently provides a window for mitigation, but the ease of exploitation and high impact necessitate urgent attention.

Mitigation Recommendations

To mitigate CVE-2024-5724, organizations should immediately update the Photo Video Gallery Master plugin to a patched version once available. In the absence of an official patch, administrators should restrict Contributor-level and higher privileges to trusted users only and audit existing user roles for unnecessary permissions. Implement web application firewalls (WAFs) with rules to detect and block suspicious serialized input patterns targeting the 'PVGM_all_photos_details' parameter. Disable or remove unnecessary plugins and themes that could provide POP chains to reduce exploitation risk. Employ strict input validation and sanitization where possible, and monitor logs for unusual activity related to deserialization or object injection attempts. Regular backups and incident response plans should be in place to recover from potential compromises. Finally, consider isolating WordPress instances and using least privilege principles to limit the impact of any successful exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-06-07T00:24:05.424Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bf1b7ef31ef0b55cd89

Added to database: 2/25/2026, 9:38:57 PM

Last enriched: 2/26/2026, 2:47:28 AM

Last updated: 2/26/2026, 8:07:00 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats