The Appointments plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 2.2.1 via deserialization of untrusted input from the `wpmudev_appointments` cookie. This allows unauthenticated attackers to inject a PHP Object. Attackers were actively exploiting this vulnerability with the WP_Theme() class to create backdoors.
References
| Link | Resource |
|---|---|
| https://plugins.trac.wordpress.org/changeset/1733186/appointments | Patch |
| https://www.wordfence.com/blog/2017/10/3-zero-day-plugin-vulnerabilities-exploited-wild/ | Press/Media Coverage Third Party Advisory |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/7e8f230e-3f96-4efd-806d-72725b960303?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-10-18 04:15
Updated : 2025-12-23 17:06
NVD link : CVE-2017-20206
Mitre link : CVE-2017-20206
CVE.ORG link : CVE-2017-20206
JSON object : View
Products Affected
wpmudev
- appointments
CWE
CWE-502
Deserialization of Untrusted Data
