CVE-2026-2020: CWE-502 Deserialization of Untrusted Data in skatox JS Archive List
The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.1.7 via the 'included' shortcode attribute. This is due to the deserialization of untrusted input supplied via the 'included' parameter of the plugin's shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
AI Analysis
Technical Summary
The CVE-2026-2020 vulnerability in the skatox JS Archive List WordPress plugin arises from unsafe deserialization of untrusted input supplied via the 'included' shortcode attribute. Specifically, the plugin deserializes PHP objects from user-controlled input without proper validation or sanitization, leading to PHP Object Injection (CWE-502). This flaw affects all versions up to and including 6.1.7. An attacker with authenticated access at the Contributor level or higher can exploit this vulnerability by injecting malicious serialized PHP objects through the shortcode parameter. While the plugin itself lacks a known POP chain to facilitate exploitation, the presence of other plugins or themes that provide such chains could enable attackers to execute arbitrary code, delete files, or access sensitive data on the target system. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low privileges required, and no user interaction needed. No patches or exploit code are currently publicly available, but the risk remains significant due to the widespread use of WordPress and the plugin in question.
Potential Impact
If exploited, this vulnerability can lead to severe consequences including unauthorized code execution, arbitrary file deletion, and exposure of sensitive information. The ability to inject PHP objects and potentially execute code compromises the confidentiality, integrity, and availability of affected WordPress sites. This can result in website defacement, data breaches, service disruption, and potential lateral movement within the hosting environment. Given WordPress's extensive use globally, organizations relying on the JS Archive List plugin are at risk of targeted attacks, especially if combined with other vulnerable plugins or themes that provide POP chains. The requirement for authenticated access at Contributor level somewhat limits the attack surface but does not eliminate risk, as many WordPress sites allow user registrations or have multiple contributors. The absence of known exploits in the wild currently reduces immediate threat but does not preclude future exploitation.
Mitigation Recommendations
Organizations should immediately review their use of the skatox JS Archive List plugin and plan to upgrade to a patched version once available. In the absence of an official patch, consider disabling or removing the plugin to eliminate the attack vector. Restrict Contributor-level access and above to trusted users only, and audit user accounts for suspicious activity. Implement Web Application Firewalls (WAFs) with rules to detect and block malicious shortcode parameters or serialized PHP object payloads. Monitor logs for unusual deserialization attempts or shortcode usage patterns. Additionally, review other installed plugins and themes for potential POP chains that could facilitate exploitation and update or remove vulnerable components accordingly. Employ principle of least privilege for WordPress roles and ensure regular backups are maintained to enable recovery from potential compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2026-2020: CWE-502 Deserialization of Untrusted Data in skatox JS Archive List
Description
The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.1.7 via the 'included' shortcode attribute. This is due to the deserialization of untrusted input supplied via the 'included' parameter of the plugin's shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
AI-Powered Analysis
Technical Analysis
The CVE-2026-2020 vulnerability in the skatox JS Archive List WordPress plugin arises from unsafe deserialization of untrusted input supplied via the 'included' shortcode attribute. Specifically, the plugin deserializes PHP objects from user-controlled input without proper validation or sanitization, leading to PHP Object Injection (CWE-502). This flaw affects all versions up to and including 6.1.7. An attacker with authenticated access at the Contributor level or higher can exploit this vulnerability by injecting malicious serialized PHP objects through the shortcode parameter. While the plugin itself lacks a known POP chain to facilitate exploitation, the presence of other plugins or themes that provide such chains could enable attackers to execute arbitrary code, delete files, or access sensitive data on the target system. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low privileges required, and no user interaction needed. No patches or exploit code are currently publicly available, but the risk remains significant due to the widespread use of WordPress and the plugin in question.
Potential Impact
If exploited, this vulnerability can lead to severe consequences including unauthorized code execution, arbitrary file deletion, and exposure of sensitive information. The ability to inject PHP objects and potentially execute code compromises the confidentiality, integrity, and availability of affected WordPress sites. This can result in website defacement, data breaches, service disruption, and potential lateral movement within the hosting environment. Given WordPress's extensive use globally, organizations relying on the JS Archive List plugin are at risk of targeted attacks, especially if combined with other vulnerable plugins or themes that provide POP chains. The requirement for authenticated access at Contributor level somewhat limits the attack surface but does not eliminate risk, as many WordPress sites allow user registrations or have multiple contributors. The absence of known exploits in the wild currently reduces immediate threat but does not preclude future exploitation.
Mitigation Recommendations
Organizations should immediately review their use of the skatox JS Archive List plugin and plan to upgrade to a patched version once available. In the absence of an official patch, consider disabling or removing the plugin to eliminate the attack vector. Restrict Contributor-level access and above to trusted users only, and audit user accounts for suspicious activity. Implement Web Application Firewalls (WAFs) with rules to detect and block malicious shortcode parameters or serialized PHP object payloads. Monitor logs for unusual deserialization attempts or shortcode usage patterns. Additionally, review other installed plugins and themes for potential POP chains that could facilitate exploitation and update or remove vulnerable components accordingly. Employ principle of least privilege for WordPress roles and ensure regular backups are maintained to enable recovery from potential compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-05T20:04:06.842Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ac8b60c48b3f10ffc6f673
Added to database: 3/7/2026, 8:32:32 PM
Last enriched: 3/7/2026, 8:33:31 PM
Last updated: 3/8/2026, 4:13:16 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.