CVE-2026-2020
PHP Object Injection in JS Archive List WordPress Plugin
Publication date: 2026-03-07
Last updated on: 2026-03-07
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordfence | jquery-archive-list-widget | to 6.1.7 (inc) |
| wordfence | jquery-archive-list-widget | 6.2.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection in all versions up to and including 6.1.7 via the 'included' shortcode attribute.
This vulnerability arises because the plugin deserializes untrusted input supplied through the 'included' parameter of its shortcode, allowing an attacker with Contributor-level access or higher to inject a PHP object.
Although no known POP (Property Oriented Programming) chain exists in the plugin itself, if a POP chain is available through other installed plugins or themes, the attacker could exploit this to delete arbitrary files, retrieve sensitive data, or execute arbitrary code.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an authenticated attacker with at least Contributor-level access to inject malicious PHP objects.
In the presence of a suitable POP chain from other plugins or themes, the attacker could perform dangerous actions such as deleting arbitrary files, accessing sensitive information, or executing arbitrary code on the server.
This can lead to significant security breaches including data loss, data theft, and full system compromise.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability involves PHP Object Injection via the 'included' shortcode attribute in the JS Archive List WordPress plugin up to version 6.1.7. Detection would focus on identifying usage of this shortcode with suspicious or unexpected serialized data in the 'included' parameter.
Since the vulnerability requires authenticated users with Contributor-level access or higher to exploit, monitoring WordPress shortcode usage and user activity logs for unusual 'included' parameter values is recommended.
There are no explicit detection commands or network signatures provided in the available resources.
However, to detect potential exploitation attempts, you could search your WordPress database or logs for shortcode usage patterns like:
- Search for posts or content containing the shortcode with the 'included' attribute, e.g., using SQL: SELECT * FROM wp_posts WHERE post_content LIKE '%[included=%';
- Check web server access logs for POST or GET requests containing the shortcode or suspicious serialized PHP objects in parameters.
- Monitor authenticated user actions, especially those with Contributor or higher roles, for unusual shortcode submissions or content edits involving the 'included' parameter.
No specific commands or automated detection tools are mentioned in the provided resources.
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'To mitigate the PHP Object Injection vulnerability in the JS Archive List plugin (up to version 6.1.7), immediate steps include:'}, {'type': 'list_item', 'content': 'Update the jquery-archive-list-widget plugin to a version later than 6.1.7 where the vulnerability is fixed (e.g., version 6.2.0 or later).'}, {'type': 'list_item', 'content': 'Restrict Contributor-level and higher user permissions to trusted users only, as exploitation requires authenticated access.'}, {'type': 'list_item', 'content': 'Disable or remove the vulnerable shortcode usage if updating is not immediately possible.'}, {'type': 'list_item', 'content': "Review and sanitize any input passed to the 'included' shortcode attribute to prevent deserialization of untrusted data."}, {'type': 'paragraph', 'content': 'The plugin update (noted in version 6.2.0) includes security improvements and tests to mitigate such vulnerabilities.'}] [6]