Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42932 | The ImageMagick Engine plugin for WordPress is vulnerable to deserialization of untrusted input via the 'cli_path' parameter in versions up to, and including 1.7.5. This makes it possible for unauthenticated users to call files using a PHAR wrapper, granted they can trick a site administrator into performing an action such as clicking on a link, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload. |
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | ImageMagick Engine <= 1.7.5 - Cross-Site Request Forgery to PHAR Deserialization | |
| Weaknesses | CWE-502 | |
| References |
|
Mon, 13 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:50:39.828Z
Reserved: 2022-10-17T19:24:28.968Z
Link: CVE-2022-3568
Updated: 2024-08-03T01:14:02.525Z
Status : Modified
Published: 2023-02-10T00:15:10.530
Modified: 2026-04-08T18:17:29.850
Link: CVE-2022-3568
No data.
OpenCVE Enrichment
No data.
EUVD