Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2020: CWE-502 Deserialization of Untrusted Data in skatox JS Archive List

0
High
VulnerabilityCVE-2026-2020cvecve-2026-2020cwe-502
Published: Sat Mar 07 2026 (03/07/2026, 01:21:22 UTC)
Source: CVE Database V5
Vendor/Project: skatox
Product: JS Archive List

Description

The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.1.7 via the 'included' shortcode attribute. This is due to the deserialization of untrusted input supplied via the 'included' parameter of the plugin's shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

AI-Powered Analysis

AILast updated: 03/07/2026, 20:33:31 UTC

Technical Analysis

The CVE-2026-2020 vulnerability in the skatox JS Archive List WordPress plugin arises from unsafe deserialization of untrusted input supplied via the 'included' shortcode attribute. Specifically, the plugin deserializes PHP objects from user-controlled input without proper validation or sanitization, leading to PHP Object Injection (CWE-502). This flaw affects all versions up to and including 6.1.7. An attacker with authenticated access at the Contributor level or higher can exploit this vulnerability by injecting malicious serialized PHP objects through the shortcode parameter. While the plugin itself lacks a known POP chain to facilitate exploitation, the presence of other plugins or themes that provide such chains could enable attackers to execute arbitrary code, delete files, or access sensitive data on the target system. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low privileges required, and no user interaction needed. No patches or exploit code are currently publicly available, but the risk remains significant due to the widespread use of WordPress and the plugin in question.

Potential Impact

If exploited, this vulnerability can lead to severe consequences including unauthorized code execution, arbitrary file deletion, and exposure of sensitive information. The ability to inject PHP objects and potentially execute code compromises the confidentiality, integrity, and availability of affected WordPress sites. This can result in website defacement, data breaches, service disruption, and potential lateral movement within the hosting environment. Given WordPress's extensive use globally, organizations relying on the JS Archive List plugin are at risk of targeted attacks, especially if combined with other vulnerable plugins or themes that provide POP chains. The requirement for authenticated access at Contributor level somewhat limits the attack surface but does not eliminate risk, as many WordPress sites allow user registrations or have multiple contributors. The absence of known exploits in the wild currently reduces immediate threat but does not preclude future exploitation.

Mitigation Recommendations

Organizations should immediately review their use of the skatox JS Archive List plugin and plan to upgrade to a patched version once available. In the absence of an official patch, consider disabling or removing the plugin to eliminate the attack vector. Restrict Contributor-level access and above to trusted users only, and audit user accounts for suspicious activity. Implement Web Application Firewalls (WAFs) with rules to detect and block malicious shortcode parameters or serialized PHP object payloads. Monitor logs for unusual deserialization attempts or shortcode usage patterns. Additionally, review other installed plugins and themes for potential POP chains that could facilitate exploitation and update or remove vulnerable components accordingly. Employ principle of least privilege for WordPress roles and ensure regular backups are maintained to enable recovery from potential compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-05T20:04:06.842Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ac8b60c48b3f10ffc6f673

Added to database: 3/7/2026, 8:32:32 PM

Last enriched: 3/7/2026, 8:33:31 PM

Last updated: 3/8/2026, 4:13:16 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses