Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5726: CWE-502 Deserialization of Untrusted Data in wpdiscover Timeline Event History

0
High
VulnerabilityCVE-2024-5726cvecve-2024-5726cwe-502
Published: Thu Jul 18 2024 (07/18/2024, 02:03:55 UTC)
Source: CVE Database V5
Vendor/Project: wpdiscover
Product: Timeline Event History

Description

CVE-2024-5726 is a high-severity vulnerability in the WordPress Timeline Event History plugin (all versions up to 3. 1) that allows authenticated users with Contributor-level access or higher to perform PHP Object Injection via the 'timelines-data' parameter. This vulnerability arises from unsafe deserialization of untrusted input, classified as CWE-502. While no direct POP (Property Oriented Programming) chain is present in the plugin itself, the presence of additional plugins or themes on the target system could enable attackers to leverage this flaw to delete files, access sensitive data, or execute arbitrary code. Exploitation requires authentication but no user interaction beyond that. The CVSS score is 8. 8, reflecting high impact on confidentiality, integrity, and availability. No known exploits are currently observed in the wild. Organizations using this plugin should prioritize patching or mitigating this vulnerability to prevent potential compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:47:48 UTC

Technical Analysis

The Timeline Event History plugin for WordPress, up to and including version 3.1, contains a critical vulnerability (CVE-2024-5726) involving unsafe deserialization of untrusted data, specifically in the 'timelines-data' parameter. This vulnerability is a PHP Object Injection flaw categorized under CWE-502, which allows an authenticated attacker with at least Contributor-level privileges to inject malicious PHP objects during the deserialization process. Although the plugin itself does not contain a known Property Oriented Programming (POP) chain to facilitate direct exploitation, the presence of other plugins or themes that provide such chains could enable attackers to escalate the impact significantly. Potential consequences include arbitrary file deletion, unauthorized data disclosure, and remote code execution. The attack vector is network-based, requiring low attack complexity and no user interaction beyond authentication. The vulnerability affects all versions of the plugin up to 3.1, and no patches or updates are currently linked in the provided data. The CVSS v3.1 base score of 8.8 reflects the high severity due to the broad impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple plugins or themes that could facilitate exploitation.

Potential Impact

This vulnerability can have severe consequences for organizations running WordPress sites with the Timeline Event History plugin installed. An attacker with Contributor-level access can exploit this flaw to inject malicious PHP objects, potentially leading to remote code execution, arbitrary file deletion, or sensitive data exposure if a suitable POP chain exists in the environment. This can result in full site compromise, data breaches, defacement, or service disruption. The requirement for authenticated access limits the attack surface but does not eliminate risk, as Contributor-level accounts are common in collaborative environments. The impact extends to the confidentiality, integrity, and availability of affected systems, potentially affecting customer data, internal communications, and operational continuity. Organizations relying on this plugin without mitigation are at risk of targeted attacks, especially if combined with other vulnerable components. The absence of known exploits in the wild suggests a window of opportunity to remediate before widespread exploitation occurs.

Mitigation Recommendations

1. Immediately update the Timeline Event History plugin to a patched version once available from the vendor. 2. In the absence of an official patch, restrict Contributor-level and higher privileges to trusted users only, minimizing the risk of exploitation. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious deserialization payloads targeting the 'timelines-data' parameter. 4. Conduct a thorough audit of installed plugins and themes to identify and remove or update components that could provide POP chains facilitating exploitation. 5. Employ security plugins that monitor and alert on unusual file changes or code execution attempts within the WordPress environment. 6. Regularly back up WordPress sites and databases to enable rapid recovery in case of compromise. 7. Harden WordPress installations by disabling PHP execution in upload directories and limiting file permissions. 8. Monitor logs for unusual authenticated user activity, especially from Contributor-level accounts. 9. Educate site administrators and users about the risks of granting Contributor-level access and enforce strong authentication controls. 10. Consider isolating critical WordPress instances or using containerization to limit the blast radius of potential exploits.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-06-07T00:45:17.808Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bf1b7ef31ef0b55cd8d

Added to database: 2/25/2026, 9:38:57 PM

Last enriched: 2/26/2026, 2:47:48 AM

Last updated: 2/26/2026, 8:07:56 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats